From owner-freebsd-security Mon Jan 6 15:20: 0 2003 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 28FE837B401 for ; Mon, 6 Jan 2003 15:19:57 -0800 (PST) Received: from hermes1.avenir-telematique.com (ategate1.ate.tm.fr [212.234.101.249]) by mx1.FreeBSD.org (Postfix) with SMTP id 5397E43EA9 for ; Mon, 6 Jan 2003 15:19:55 -0800 (PST) (envelope-from mrousseau@k-meleon.com) Received: (qmail 3253 invoked by uid 504); 6 Jan 2003 23:19:48 -0000 Received: from mrousseau@k-meleon.com by hermes1.avenir-telematique.com by uid 501 with qmail-scanner-1.14 (iscan: v3.1/v5.500-0829/349/47477. Clear:. Processed in 0.444746 secs); 06 Jan 2003 23:19:48 -0000 Received: from 139.144.62.62.9velizy1-0-ro-as-i3-2.9tel.net (HELO PestifereWin2k) (62.62.144.139) by 0 with SMTP; 6 Jan 2003 23:19:48 -0000 Message-ID: <003a01c2b5da$0e5ab9c0$2101a8c0@PestifereWin2k> From: "Maxence Rousseau" To: Subject: FAKE Fw: OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS Date: Tue, 7 Jan 2003 00:19:26 +0100 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4920.2300 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4920.2300 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org ----- Original Message ----- From: "Global InterSec Research" To: Sent: Monday, January 06, 2003 9:05 PM Subject: Re: OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS > > As some may have gathered, the advisory recently posted by mmhs@hushmail.com > was indeed a fake, intended to highlight several unclear statements made in GIS2002062801. > > The advisory in question is currently being updated with more detailed information and will be > re-posted at: http://www.globalintersec.com/adv/openssh-2002062801.txt as soon as it becomes > available. > > Note that the kbd-init flaw described in GIS2002062801 was proven to be exploitable in our lab > although not all evidence to demonstrate this was provided in the original advisory. A mistake > was made in the original advisory draft, where chunk content data was shown, rather than the > entire corrupted malloc chunk. This will be amended in the revision. > > Also note that to our knowledge there are currently no known, exploitable flaws in OpenSSH 3.5p1, > due to its use of PAM as suggested by mmhs@hushmail.com. It is almost certain that the posted > bogus advisory was also intended to cause alarm amongst communities using OpenSSH, through > miss-information. > > > Global InterSec LLC. > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message