lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030917141520.GA25753@eiv.com>
From: smcmahon at eiv.com (Shawn McMahon)
Subject: openssh remote exploit

On Wed, Sep 17, 2003 at 01:24:43PM +0000, petard said:
> 
> An exploit would certainly constitute such evidence. Have you seen anything
> that indicates this bug is exploitable?

I wouldn't call this conclusive by any stretch of the imagination, but:

http://slashdot.org/comments.pl?sid=78703&cid=6976485
http://slashdot.org/comments.pl?sid=78703&cid=6975825
http://slashdot.org/comments.pl?sid=78703&cid=6976416

The second poster is a known troll, but the other two don't appear to
be.

But it's random slashdot posts, with no exploit code provided, so take
it with a small Siberian salt mine.



-- 
Shawn McMahon     | Let every nation know, whether it wishes us well or ill,
EIV Consulting    | that we shall pay any price, bear any burden, meet any
UNIX and Linux	  | hardship, support any friend, oppose any foe, to assure
http://www.eiv.com| the survival and the success of liberty. - JFK
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030917/c339cd37/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ