delorie.com/archives/browse.cgi | search |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sources.redhat.com/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sources.redhat.com/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
Date: | Tue, 16 Sep 2003 17:39:35 -0400 |
From: | "Tony Schmitt" <tonyschmitt2 AT aol DOT com> |
Subject: | new openssh vulnerability |
To: | cygwin AT cygwin DOT com |
Message-ID: | <3F678317.6040001@aol.com> |
MIME-Version: | 1.0 |
X-AOL-IP: | 10.160.36.105 |
Corinna - I was informed of an SSH hole today. Referring to http://www.securityfocus.com/advisories: "...a buffer management error found in versions of OpenSSH earlier than 3.7. The possibility exists that this error could allow a remote exploit..." Were you aware of this? Thanks, Tony Schmitt -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Problem reports: http://cygwin.com/problems.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |