Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Nov 2001 20:28:48 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        00 <x2s500y@sekurity.net>
Cc:        Chris Byrnes <chris@JEAH.net>, security@freebsd.org
Subject:   Re: sshd exploit?
Message-ID:  <20011128202848.C51646@xor.obsecurity.org>
In-Reply-To: <007201c17887$c7ac4b00$0100000a@001>; from x2s500y@sekurity.net on Wed, Nov 28, 2001 at 10:41:44PM -0500
References:  <007201c17887$c7ac4b00$0100000a@001>

next in thread | previous in thread | raw e-mail | index | archive | help

--GZVR6ND4mMseVXL/
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Wed, Nov 28, 2001 at 10:41:44PM -0500, 00 wrote:
> Yes, your friend is right, I'm not sure of the specifics, but I have a copy
> of the exploit and it has only been released in binary form.  OpenBSD's
> OpenSSH team or no other SSH development group has yet to make a formal
> statement, most likely due to the fact they don't know what the vunerability
> is as of yet so they don't want to spark a fire.  The vunerability is a
> great threat because it is remote and root compromisable.  The exploit scans
> a listing of addresses, and when it find a host it just drops to a
> rootshell.

Please forward a copy to security-officer@FreeBSD.org.  We've only
seen an exploit for the old vulnerability in OpenSSH 2.2.0, which
obviously isn't that exciting :)

Kris

--GZVR6ND4mMseVXL/
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE8Bbl/Wry0BWjoQKURAkYdAKDebf3NZ2dJrLhCPtKGrVV3Z98g2QCfUo2o
1suwdQyv2r+pK67/ZBzS2NE=
=QjSG
-----END PGP SIGNATURE-----

--GZVR6ND4mMseVXL/--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011128202848.C51646>