[
Date Prev
][
Date Next
] [
Thread Prev
][
Thread Next
] [
Date Index
] [
Thread Index
]
Re: HEAD's UP: possible 0day SSH exploit in the wild
To
: debian-security <
debian-security@lists.debian.org
>
Subject
: Re: HEAD's UP: possible 0day SSH exploit in the wild
From
: Leandro Minatel <
leandrominatel@gmail.com
>
Date
: Tue, 7 Jul 2009 18:15:30 -0300
Message-id
: <
[🔎]
f9971d420907071415m306cb47bhad3619ee288b20e4@mail.gmail.com
>
In-reply-to
: <
[🔎]
4A53B1CF.509@abi007.info
>
References
: <
[🔎]
4A53AD2B.4080500@techsupport.lt
> <
[🔎]
4A53B1CF.509@abi007.info
>
Hi,
a good practice, at least for me, is put openssh to listen in a different port than the default. I know, it's not the perfect solution.
Regards.
Reply to:
debian-security@lists.debian.org
Leandro Minatel (on-list)
Leandro Minatel (off-list)
Follow-Ups
:
Re: HEAD's UP: possible 0day SSH exploit in the wild
From:
Jeroen van Drongelen <jeroen@naturewebdesign.eu>
References
:
Re: HEAD's UP: possible 0day SSH exploit in the wild
From:
"Ramunas / techsupport.lt" <ramunas@techsupport.lt>
Re: HEAD's UP: possible 0day SSH exploit in the wild
From:
Justus <justus@abi007.info>
Prev by Date:
Re: HEAD's UP: possible 0day SSH exploit in the wild
Next by Date:
Re: HEAD's UP: possible 0day SSH exploit in the wild
Previous by thread:
Re: HEAD's UP: possible 0day SSH exploit in the wild
Next by thread:
Re: HEAD's UP: possible 0day SSH exploit in the wild
Index(es):
Date
Thread