Subject: SSH vulnerability
To: None <netbsd-help@netbsd.org>
From: Claude Marinier <claude.marinier@dreo.dnd.ca>
List: netbsd-help
Date: 02/14/2001 09:26:58
Hi,
Does this apply to us?
> From Security_UPDATE@list.win2000mag.net Wed Feb 14 09:25:24 2001
> Date: Tue, 13 Feb 2001 15:36:20 -0600
> From: Security UPDATE <Security_UPDATE@list.win2000mag.net>
> Subject: SECURITY ALERT, February 13,
> 2001: PCAnywhere DoS; SSH Buffer Overflow; NT 4.0 Privilege Escalation
>
> =====================================================================
> Security Alert, February 13, 2001
>
> BindView RAZOR reported that implementations of Secure Shell (SSH)
> that include CORE SDI's deattack.c code are vulnerable to an integer
> overflow attack that can let arbitrary commands execute on the host
> server. SSH vendors are aware of the matter, and many have already
> released patches to correct the matter.
--
Claude Marinier, Information Technology Group claude.marinier@dreo.dnd.ca
Defence Research Establishment Ottawa (DREO) (613) 998-4901 FAX 998-2675
3701 Carling Avenue, Ottawa, Ontario K1A 0Z4 http://www.dreo.dnd.ca