[TriLUG] Fwd: Upcoming OpenSSH vulnerability *unverified*

H. Wade Minter minter at lunenburg.org
Mon Jun 24 19:39:56 EDT 2002


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Be ready for this SSH stuff coming down the pike...

Begin forwarded message:

> From: Christopher Schulte <schulte+freebsd at nospam.schulte.org>
> Date: Mon Jun 24, 2002  05:54:40 PM US/Eastern
> To: freebsd-security at FreeBSD.ORG
> Subject: Upcoming OpenSSH vulnerability *unverified*
>
> Any of you folk seen this yet?
>
> http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=102495293705094&q=raw
>
> 'There is an upcoming OpenSSH vulnerability that we're working on with
> ISS. Details will be published early next week.'
>
> I don't know the legitimacy of the info, but...
>
> offtopic: If this is legit, why is ISS working with the OpenBSD and 
> OpenSSH people, after giving Apache such a run last week?  Curious.
>
> --
> Christopher Schulte
> http://www.schulte.org/
> Do not un-munge my @nospam.schulte.org
> email address.  This address is valid.
>
>
> To Unsubscribe: send mail to majordomo at FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (Darwin)
Comment: For info see http://www.gnupg.org

iD8DBQE9F63Uo4DwsyRGDscRAuxqAKCHJ5Hr6fwX8sLPvH65TQuQLQGuQQCeNZFs
4Z7nZ8W8aRUoAGzkX0i8kos=
=ArOn
-----END PGP SIGNATURE-----




More information about the TriLUG mailing list