[19102] in bugtraq
Smoothwall SSH Vulnerability fix
daemon@ATHENA.MIT.EDU (Dan Cuthbert)
Fri Feb 9 12:26:41 2001
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <BEECILCKHMFGNBEGEBFKKEGODDAA.daniel.cuthbert@uk.psi.com>
Date: Fri, 9 Feb 2001 12:31:04 -0000
Reply-To: Dan Cuthbert <daniel.cuthbert@UK.PSI.COM>
From: Dan Cuthbert <daniel.cuthbert@UK.PSI.COM>
X-To: Smoothwall-Talk <smoothwall-talk@lists.sourceforge.net>,
'Smoothwall-Chat <smoothwall-chat@lists.sourceforge.net>
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++
Smoothwall Security Advisory SSA-0902-1
security@smoothwall.org
February 9th 2001
Dan Cuthbert
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++
Smoothwall Versions affected:
All Versions currently using the OpenSSH protocol are affected,
please upgrade to the new version available
Known exploits:
There are no known working exploits known at present
Updated SSH Binaries:
An updated version of OpenSSH v2.3 is available on the Smoothwall FTP
server, and HOWTO is also included within the tarball
ftp://146.101.126.9/pub/updates/
MD5 (smoothwall-openssh-2.3.0p1.tar.gz) =
76cce7d9eade80b78dd1526ae50f28ff 1149612 bytes
Dan Cuthbert
Security Manager
Smoothwall Firewall Project
http://www.smoothwall.org
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
iQA/AwUBOoPjB9g3Mtg4nR8oEQLheACgzYbQ6mYijnmfsDHnwSTcQWCX81IAoN+t
THejMu8HI2IG3fUnYM4aPifY
=CTw+
-----END PGP SIGNATURE-----