[19102] in bugtraq

home help back first fref pref prev next nref lref last post

Smoothwall SSH Vulnerability fix

daemon@ATHENA.MIT.EDU (Dan Cuthbert)
Fri Feb 9 12:26:41 2001

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <BEECILCKHMFGNBEGEBFKKEGODDAA.daniel.cuthbert@uk.psi.com>
Date:         Fri, 9 Feb 2001 12:31:04 -0000
Reply-To: Dan Cuthbert <daniel.cuthbert@UK.PSI.COM>
From: Dan Cuthbert <daniel.cuthbert@UK.PSI.COM>
X-To:         Smoothwall-Talk <smoothwall-talk@lists.sourceforge.net>,
              'Smoothwall-Chat <smoothwall-chat@lists.sourceforge.net>
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++
Smoothwall Security Advisory SSA-0902-1
security@smoothwall.org
February 9th 2001
      Dan Cuthbert
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++

Smoothwall Versions affected:

All Versions currently using the OpenSSH protocol are affected,
please upgrade to the new version available

Known exploits:

There are no known working exploits known at present

Updated SSH Binaries:

An updated version of OpenSSH v2.3 is available on the Smoothwall FTP
server, and HOWTO is also included within the tarball

ftp://146.101.126.9/pub/updates/

MD5 (smoothwall-openssh-2.3.0p1.tar.gz) =
76cce7d9eade80b78dd1526ae50f28ff    1149612 bytes


Dan Cuthbert
Security Manager
Smoothwall Firewall Project
http://www.smoothwall.org

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQA/AwUBOoPjB9g3Mtg4nR8oEQLheACgzYbQ6mYijnmfsDHnwSTcQWCX81IAoN+t
THejMu8HI2IG3fUnYM4aPifY
=CTw+
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post