Date: Wed, 28 Nov 2001 22:18:29 -0700 From: Brett Glass <brett@lariat.org> To: "Mauro Dias" <localhost@dsgx.org>, <security@FreeBSD.ORG> Subject: Re: sshd exploit Message-ID: <4.3.2.7.2.20011128221259.04665720@localhost> In-Reply-To: <009501c17893$b99415a0$0200a8c0@mdrjr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
At 10:07 PM 11/28/2001, Mauro Dias wrote: >I readed the message about the sshd exploit >i have a binary copy of this exploit. >it's exploits ssh versions: >ssh-1.2.26 >ssh-1.2.27 >OpenSSH-2.2.0p1 I wonder if this is the same exploit mentioned by Dittrich and CERT -- the CRC32 compensation attack detector overflow in SSH1. If so, you can probably patch the hole temporarily by disabling version 1 of the protocol. You can then upgrade to eliminate the hole. 3.0.1p1 is said to be immune. It's what I've run ever since I first heard about the vulnerability. --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20011128221259.04665720>