Dear Sirs;
Your box is only vulnerable IF and ONLY IF you compiled ssh with the
RSAREF option.  You would have had to run './configure --with-RSAREF' or
something along those lines.  I haven't compiled it (ssh 1.2.27) in the last 2
weeks so I couldn't really tell you what the exact parameter is.  Running
`sshd -V' or whatever you had to do to get ssh to return a version ('sshd
--version'??) should tell you whether or not you compiled it with RSAREF.

Cheers,

Mike

Bernhard Rosenkraenzer wrote:

> On Wed, 19 Jan 2000, Michael J. McGillick wrote:
>
> > A buddy of mine believes that I'm running an insecure version of SSH.  My
> > current version is:
> >
> >    ssh-1.2.27-5us
> >
> > How do I tell if my version is insecure,
>
> Check if it is RSA-enabled and not patched.
>
> > and where would I get the latest version from?
>
> ftp://ftp.redhat.de/pub/rh-addons/security/
>
> You'll probably want to switch to OpenSSH while you're at it.
>
> LLaP
> bero
>
> --
> Anyone sending unsolicited bulk email (UBE, SPAM) to this address will be
> charged a $25 handling fee plus a $5 network traffic fee per started
> kilobyte. By extracting my address from this message or its header, you
> agree to these terms.
>
> Nevertheless, spammers trying to auto-extract addresses from this message
> will definitely want to include [EMAIL PROTECTED] and [EMAIL PROTECTED]
>
> --
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to