From owner-freebsd-questions Tue Dec 17 9:10:10 2002 Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id EC78037B401 for ; Tue, 17 Dec 2002 09:10:09 -0800 (PST) Received: from colossus.systems.pipex.net (colossus.systems.pipex.net [62.241.160.73]) by mx1.FreeBSD.org (Postfix) with ESMTP id 542AB43EC2 for ; Tue, 17 Dec 2002 09:10:09 -0800 (PST) (envelope-from stacey@vickiandstacey.com) Received: from [192.168.1.8] (81-86-129-77.dsl.pipex.com [81.86.129.77]) by colossus.systems.pipex.net (Postfix) with ESMTP id C99B7160007F0 for ; Tue, 17 Dec 2002 17:10:07 +0000 (GMT) Subject: Thought of the list: CERT Advisory CA-2002-36 Multiple Vulnerabilities in SSH Implementations From: Stacey Roberts Reply-To: stacey@vickiandstacey.com To: FreeBSD Questions Content-Type: text/plain Organization: Message-Id: <1040145009.58381.19.camel@localhost> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.2.0 Date: 17 Dec 2002 17:10:09 +0000 Content-Transfer-Encoding: 7bit Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG This just landed in my Inbox. Figured the list might like to be aware of this: Multiple vendors' SSH transport layer protocol implementations contain vulnerabilities in key exchange and initialization http://www.kb.cert.org/vuls/id/389665 Regards, Stacey -- Stacey Roberts B.Sc (HONS) Computer Science Web: www.vickiandstacey.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message