there _have_ been ssh sploits in the past; they're probably testing you to
see if you're running one of the exploitable versions.  i'm not aware of any
vulnerabilities in the present release of ssh or openssh, but read your
bugtraq, and keep up with the latest version.

On Mon, Sep 11, 2000 at 03:22:28PM -0500, Alan Mead wrote:
> Anyone know what's behind this?  I take it the exploit de'jour is ssh?  If 
> so, are there any openSSH exploits?  I don't recall any nor does their 
> webpage list any.  I've gotten several of these probes, including a bunch 
> from our ISP's address space!
> 
> Sep 11 12:57:41 zeus portsentry[578]: attackalert: UDP scan from host: 
> premiumA57.eugn.uswest.net/209.180.177.57 to UDP port: 22
> 
> -Alan
> ---
> Alan Mead, Ph.D.  /  Research Scientist  /  [EMAIL PROTECTED]
> Institute for Personality and Ability Testing
> 1801 Woodfield Dr  /  Savoy IL 61874 USA
> 217-352-4739 (v)  /  217-352-9674 (f)
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list

-- 
Michael Jinks, IB
Systems Administrator, CCCP
finger [EMAIL PROTECTED] for public key
Vote Duke! http://www.entertaindom.com/pages/duke2000/home.jsp



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to