[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Vulnerable SSH versions



  Hi there!

  During this weekend, there has been paper posted to bugtraq named "Analysis of
SSH crc32 compensation attack detector exploit". It talks about a recorded
successful exploit using overflow in CRC32 compensation attack detection code, a
hole, which was discovered in February this year.

  In the appendices, there is also program checking if you are vulnerable by
checking the version string SSH daemon produces on connect. The newest Dewbian
Potato version produces string "SSH-1.5-OpenSSH-1.2.3" which is listed as
vulnerable to this security hole. However, the Debian advisory released in
February says refers to version 1.2.3 as having this fixed...

  So how it is? Who is wrong?

							  Thanks,
								Michal

-- 
PING 111.111.111.111 (111.111.111.111): 56 data bytes
...
---- Waiting for outstanding packets ----
No outstanding packets received, just two ordinary.



Reply to: