[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: ssh vulnerability in the wild



Ted Roby <secalert@tedroby.com> writes:

> Does this vulnerability require a login? Is a system safe if it does not
> allow root login, and password logins?

Nobody knows the answer at the moment.  There isn't any obvious way to
exploit the overflow (mind that the attacker cannot write arbitrary
data, just a couple of zeros), and I still doubt if it is exploitable
at all.



Reply to: