Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Nov 2001 22:18:29 -0700
From:      Brett Glass <brett@lariat.org>
To:        "Mauro Dias" <localhost@dsgx.org>, <security@FreeBSD.ORG>
Subject:   Re: sshd exploit
Message-ID:  <4.3.2.7.2.20011128221259.04665720@localhost>
In-Reply-To: <009501c17893$b99415a0$0200a8c0@mdrjr.net>

next in thread | previous in thread | raw e-mail | index | archive | help
At 10:07 PM 11/28/2001, Mauro Dias wrote:
  
>I readed the message about the sshd exploit
>i have a binary copy of this exploit.
>it's exploits ssh versions:
>ssh-1.2.26
>ssh-1.2.27
>OpenSSH-2.2.0p1

I wonder if this is the same exploit mentioned by Dittrich and CERT --
the CRC32 compensation attack detector overflow in SSH1.

If so, you can probably patch the hole temporarily by disabling 
version 1 of the protocol. You can then upgrade to eliminate the hole.
3.0.1p1 is said to be immune. It's what I've run ever since I first heard 
about the vulnerability.

--Brett


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20011128221259.04665720>