Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Jun 2002 22:33:11 -0400 (EDT)
From:      Garrett Wollman <wollman@lcs.mit.edu>
To:        Chris BeHanna <behanna@zbzoom.net>
Cc:        FreeBSD Security <security@FreeBSD.ORG>
Subject:   Re: [openssh-unix-announce] Re: Upcoming OpenSSH vulnerability (fwd)
Message-ID:  <200206250233.g5P2XBZi009480@khavrinen.lcs.mit.edu>
In-Reply-To: <20020624212557.R7245-100000@topperwein.dyndns.org>
References:  <20020624163538.H10398-100000@yez.hyperreal.org> <20020624212557.R7245-100000@topperwein.dyndns.org>

next in thread | previous in thread | raw e-mail | index | archive | help
<<On Mon, 24 Jun 2002 21:35:06 -0400 (EDT), Chris BeHanna <behanna@zbzoom.net> said:

>     Result:  it's possible to completely prevent the window of
> vulnerability that usually exists between the announcement of an
> exploit and the availability of a fix for same.

Only if you run absolutely stock, bog-standard OpenSSH.  Many of us
have different operational requirements.

-GAWollman


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206250233.g5P2XBZi009480>