Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Nov 1999 15:21:08 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        spork <spork@super-g.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable (VD#7) 
Message-ID:  <3.0.5.32.19991116152108.0170f850@staff.sentex.ca>
In-Reply-To: <Pine.BSF.4.00.9911161511340.5841-100000@super-g.com>
References:  <Pine.BSF.4.10.9911161121130.676-100000@frosty.purefusion.com>

next in thread | previous in thread | raw e-mail | index | archive | help
At 03:14 PM 11/16/99 -0500, spork wrote:
>Also, has anyone been able to get openssh to compile on a 2.2 system?  The
>openssl port fails due to a flag to ld which does not exist back in 2.2
>land, but grabbing the source and compiling from scratch works.  However
>openssh fails as shown below...  If anyone has patches for 2.2, please
>post them.  


I cant help you with OpenSSH, but the patches for sshd have been commited
to fix the exploit in question.

	---Mike
------------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Network Administrator,     			  mike@sentex.net
Sentex Communications                 		  www.sentex.net
Cambridge, Ontario Canada


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.19991116152108.0170f850>