From owner-freebsd-questions Tue Oct 30 12:55:24 2001 Delivered-To: freebsd-questions@freebsd.org Received: from mail.XtremeDev.com (xtremedev.com [216.241.38.65]) by hub.freebsd.org (Postfix) with ESMTP id 6FE2737B409 for ; Tue, 30 Oct 2001 12:55:18 -0800 (PST) Received: from xtremedev.com (xtremedev.com [216.241.38.65]) by mail.XtremeDev.com (Postfix) with ESMTP id CFE6D70607; Tue, 30 Oct 2001 13:55:10 -0700 (MST) Date: Tue, 30 Oct 2001 13:55:10 -0700 (MST) From: FreeBSD user To: Kelsey Cummings Cc: freebsd-questions@freebsd.org Subject: Re: SSH exploits? In-Reply-To: <20011030121502.N42541@sonic.net> Message-ID: <20011030135434.W79218-100000@Amber.XtremeDev.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG Old exploit. Already been patched a while ago IIRC in -stable. On Tue, 30 Oct 2001, Kelsey Cummings wrote: > http://razor.bindview.com/publish/advisories/adv_ssh1crc.html > > Looks like there is another ssh exploit. Our experience is > showing that the script kiddies have tools for this already. > > -- > Kelsey Cummings - kgc@sonic.net sonic.net > System Administrator 300 B Street, Ste 101 > 707.522.1000 (Voice) Santa Rosa, CA 95404 > 707.547.2199 (Fax) http://www.sonic.net/ > Fingerprint = 7F 59 43 1B 44 8A 0D 57 91 08 73 73 7A 48 90 C5 > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message > > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message