[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030917141520.GA25753@eiv.com>
From: smcmahon at eiv.com (Shawn McMahon)
Subject: openssh remote exploit
On Wed, Sep 17, 2003 at 01:24:43PM +0000, petard said:
>
> An exploit would certainly constitute such evidence. Have you seen anything
> that indicates this bug is exploitable?
I wouldn't call this conclusive by any stretch of the imagination, but:
http://slashdot.org/comments.pl?sid=78703&cid=6976485
http://slashdot.org/comments.pl?sid=78703&cid=6975825
http://slashdot.org/comments.pl?sid=78703&cid=6976416
The second poster is a known troll, but the other two don't appear to
be.
But it's random slashdot posts, with no exploit code provided, so take
it with a small Siberian salt mine.
--
Shawn McMahon | Let every nation know, whether it wishes us well or ill,
EIV Consulting | that we shall pay any price, bear any burden, meet any
UNIX and Linux | hardship, support any friend, oppose any foe, to assure
http://www.eiv.com| the survival and the success of liberty. - JFK
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030917/c339cd37/attachment.bin
Powered by blists - more mailing lists