[19085] in bugtraq
Re: [CORE SDI ADVISORY] SSH1 session key recovery vulnerability
daemon@ATHENA.MIT.EDU (Niels Provos)
Thu Feb 8 17:42:45 2001
Message-Id: <20010208205259.2667D207C3@citi.umich.edu>
Date: Thu, 8 Feb 2001 15:52:59 -0500
Reply-To: provos@CITI.UMICH.EDU
From: Niels Provos <provos@CITI.UMICH.EDU>
X-To: =?iso-8859-1?Q?Iv=E1n_Arce?= <core.lists.bugtraq@CORE-SDI.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: =?iso-8859-1?Q?Iv=E1n_Arce?=, Wed, 07 Feb 2001 15:48:58 -0300
In message <073f01c09136$ddc04240$2e58a8c0@ffornicario>, =?iso-8859-1?Q?Iv=E1n_
Arce?= writes:
> OpenSSH
> The vulnerability is present in OpenSSH up to version 2.3.0,
> although it is not possible to exploit it due to limits imposed
> on the number of simultaneous connections the server is allowed
> to handle,
This is a confusing way to put it. This attack is not feasible on
OpenSSH. The connection limits takes care of it. If you are running
OpenSSH 2.3.0, you are completely fine.
Niels.