Hello,

  I don't really know much about computer security, but I do have ssh
installed on my computer so I'm somewhat concerned, please forgive my
stupidity if I ask questions that seem stupid, ignorant or trivial.

  When I read slashdot this morning, I thought the article titled
"New ssh Exploit in the Wild" implied that an exploit was already out
... or does "in the Wild" generally mean it's theoretically possible,
but not necessairly done yet?

  Also, from the sounds of the debian-security list, I get the
impression that the SSH vulnerability is not as bad as it sounds --
but from the Slashdot posts (with people posting random sections of
logs, links to RPMS/SRPMS, and suggesting alternatives) it seems as
if the risk is most serious. Can anyone enlighten my ignorance on
this?

  On a slightly off topic note, I'm thinking about running an
ftp/http/ssh server for personal use in college. What precautionary
measures should I take, or rather can I take? From reading over the
various Slashdot posts, I'm thinking that beyond

  (1) making sure system isn't running any unnecessary servers
(Debian seems pretty good in this by default)
  (2) making sure all software is up to date
     and
  (3) since it's a college campus, possibly being able to ask
technical support for the subnet (correct word?) of all campus IP
addresses, and only allowing access IP addresses on that subnet

 beyond all of that, there really isn't much that I can do is there?

Thanks,
--TongKe Xue

--- Josh Carroll <[EMAIL PROTECTED]> wrote:
> Actually, people have reported that there is an exploit, and in
> fact even OpenBSD is vulnerable.
> 
> I would still patch ASAP. Best not to risk it.
> 
> It's probably a matter of time before a widely available exploit is
> released. Right now it seems
> it's in the hands of a select few, but that will probably change
> sooner than later.
> 
> By the way, you can grab the incoming openssh package from:
> 
> http://incoming.debian.org/ssh_3.6.1p2-6.0_i386.deb
> 
> if you want to patch your unstable system without building your own
> package with the buffer.c
> patch. (assuming i386 of course).
> 
> I personally would like to see said exploit so I can test my
> systems post-patch. But I guess
> we'll have to trust the packages and/or buffer.c patch.
> 
> Josh
> 
> 
> Florian Weimer ([EMAIL PROTECTED]) wrote:
> > Ted Roby <[EMAIL PROTECTED]> writes:
> > 
> > > Does this vulnerability require a login? Is a system safe if it
> does not
> > > allow root login, and password logins?
> > 
> > Nobody knows the answer at the moment.  There isn't any obvious
> way to
> > exploit the overflow (mind that the attacker cannot write
> arbitrary
> > data, just a couple of zeros), and I still doubt if it is
> exploitable
> > at all.
> > 
> > 
> > -- 
> > To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> > with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> > 
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> 


__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to