[19085] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [CORE SDI ADVISORY] SSH1 session key recovery vulnerability

daemon@ATHENA.MIT.EDU (Niels Provos)
Thu Feb 8 17:42:45 2001

Message-Id:  <20010208205259.2667D207C3@citi.umich.edu>
Date:         Thu, 8 Feb 2001 15:52:59 -0500
Reply-To: provos@CITI.UMICH.EDU
From: Niels Provos <provos@CITI.UMICH.EDU>
X-To:         =?iso-8859-1?Q?Iv=E1n_Arce?= <core.lists.bugtraq@CORE-SDI.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  =?iso-8859-1?Q?Iv=E1n_Arce?=, Wed, 07 Feb 2001 15:48:58 -0300

In message <073f01c09136$ddc04240$2e58a8c0@ffornicario>, =?iso-8859-1?Q?Iv=E1n_
Arce?= writes:
> OpenSSH
>  The vulnerability is present in OpenSSH up to version 2.3.0,
>  although it is not possible to exploit it  due to limits imposed
>  on the number of simultaneous connections the server is allowed
>  to handle,
This is a confusing way to put it.  This attack is not feasible on
OpenSSH.  The connection limits takes care of it.  If you are running
OpenSSH 2.3.0, you are completely fine.

Niels.

home help back first fref pref prev next nref lref last post