From owner-freebsd-security Sun Nov 18 12:13:43 2001 Delivered-To: freebsd-security@freebsd.org Received: from thedarkside.nl (cc31301-a.assen1.dr.nl.home.com [213.51.66.128]) by hub.freebsd.org (Postfix) with ESMTP id C23DE37B405 for ; Sun, 18 Nov 2001 12:13:38 -0800 (PST) Received: (from root@localhost) by thedarkside.nl (8.11.6/8.11.6) id fAIKDZJ25858; Sun, 18 Nov 2001 21:13:35 +0100 (CET) (envelope-from g.p.de.boer@st.hanze.nl) Received: from kilmarnock.st.hanze.nl (kilmarnock [10.0.0.2]) by thedarkside.nl (8.11.6/8.11.6av) with ESMTP id fAIKDUB25850; Sun, 18 Nov 2001 21:13:30 +0100 (CET) (envelope-from g.p.de.boer@st.hanze.nl) Message-Id: <5.1.0.14.0.20011118211207.01fd4df8@thedarkside.nl> X-Sender: 125105@pop5.st.hanze.nl X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 18 Nov 2001 21:13:28 +0100 To: Brett Glass , security@freebsd.org From: "G.P. de Boer" Subject: Re: Patching 4.4-RELEASE against SSHv1 exploit In-Reply-To: <4.3.2.7.2.20011118124921.041ea050@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Virus-Scanned: by AMaViS perl-10 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org At 20:56 18-11-2001, Brett Glass wrote: >In a recent message to Bugtraq (quoted below), Dave Dittrich notes that an >SSH exploit has been specifically tuned to attack machines running FreeBSD >4.x and certain versions of SSH. The hole apparently dates back to the >liberally licensed versions of SSH, and so is present in both OpenSSH and >SSH, Inc.'s SSH. Is 4.4-RELEASE vulnerable in the default install if sshd >is enabled? If so, is there a patch? 4.4-RELEASE base has OpenSSH-2.3.0, which isn't vulnerable to this attack. GP. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message