Seems it is just a rerun of an old exploit: http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=100698565325242&w=2 Thanks, James Spinti jspinti at dartdist.com 952-368-3278 x396 fax 952-368-3255 |-----Original Message----- |From: tclug-list-admin at mn-linux.org |[mailto:tclug-list-admin at mn-linux.org]On Behalf Of Joshua b. Jore |Sent: Thursday, November 29, 2001 10:32 PM |To: tclug-list at mn-linux.org |Subject: [TCLUG] [Security Discuss] new sshd exploit ? (fwd) | | |-----BEGIN PGP SIGNED MESSAGE----- |Hash: SHA1 | |(forwarded from misc at openbsd.org. The affected people ran Redhat) | |FYI... heads' up from the SSH mail list | |> > A colleague sent me a very vague e-mail, telling me that I |should 'disable |> > SSHD now' because of a 'private exploit being circulated since |Saturday'. |> > |> > Anyone know anything about this? |> |> The following URL should give you some more information: |> http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=100696253318793&w=2 | |Given the other issue of Kerberos pre-v3, an update to the |latest OpenSSH 3.0+ seems warrented. | http://www.oreillynet.com/lpt/a/linux/2001/11/26/insecurities.html |-----BEGIN PGP SIGNATURE----- |Version: GnuPG v1.0.6 (OpenBSD) |Comment: For info see http://www.gnupg.org | |iD8DBQE8Bu95fexLsowstzcRAn9UAJwPqCgv7n5zBAF7K4EbUGfgml2cLQCfdICG |bS4kDoKGWmvGLrp+PXs2kiA= |=Z8jF |-----END PGP SIGNATURE----- | |_______________________________________________ |Twin Cities Linux Users Group Mailing List - Minneapolis/St. Paul, |Minnesota |http://www.mn-linux.org |tclug-list at mn-linux.org |https://mailman.mn-linux.org/mailman/listinfo/tclug-list |