On Fri, Feb 09, 2001 at 08:14:08PM -0500, Jonathan D. Proulx wrote:
> Hi,
> 
> I've only seen one (rather obscure) message to debian lists about this
> one, but there are 2 new exploits out for sshd
> 
> this one is not much to loose sleep about as it's rather tricky and
> OpenSSH claims that it's not exploitable though they have patched
> their source tree as of Jan 29, 2001:
> 
> http://www.securityfocus.com/templates/archive.pike?mid=161150&fromthread=0&end2001-02-10&threads=0&list=1&start=2001-02-04&;
> 
> This one is more worry some as it's a relatively simple buffer
> overflow and the debian stable version of OpenSSH *is* vulnerable
> (unstable which uses OpenSSH 2.3.0p1 seems OK, but don't take my word
> for it):
> 
> http://razor.bindview.com/publish/advisories/adv_ssh1crc.html

there was a ssh update to stable yesterday with the following fixes:

openssh (1:1.2.3-9.2) stable; urgency=high

  * Non-maintainer upload by Security Team
  * Added backported fix for a buffer overflow (thanks to Piotr
    Roszatycki)
  * Added modified build dependencies from unstable for convenience
  * Added patch that fixes an rsa key exchange problem made public by
    CORE SDI.

 -- Martin Schulze <[EMAIL PROTECTED]>  Thu,  8 Feb 2001 22:15:04 +0100

does that cover it?  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Attachment: pgpYv2AM7C5PS.pgp
Description: PGP signature

Reply via email to