thanks.

> -----Original Message-----
> From: Larry Price [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, September 16, 2003 3:54 PM
> To: The Eugene Unix and GNU/Linux User Group's mail list
> Subject: Re: [eug-lug]SSH Exploit
> 
> 
> I'm in the middle of patching some of our systems
> and from reading the security advisory it looks like it's a DOS vuln, 
> but NOT a remote root
> 
> quoting  FreeBSD Security Advisory FreeBSD-SA-03:12.openssh
> """
> When a packet is received that is larger than the space remaining in
> the currently allocated buffer, OpenSSH's buffer management attempts
> to reallocate a larger buffer.  During this process, the recorded size
> of the buffer is increased.  The new size is then range checked.  If
> the range check fails, then fatal() is called to cleanup and exit.
> In some cases, the cleanup code will attempt to zero and free the
> buffer that just had its recorded size (but not actual allocation)
> increased.  As a result, memory outside of the allocated buffer will
> be overwritten with NUL bytes.
> 
> III. Impact
> 
> A remote attacker can cause OpenSSH to crash.  The bug is not believed
> to be exploitable for code execution on FreeBSD.
> 
> """
> 
> I have seen reports of a remote-root exploit, but not confirmed ones.
> 
> still, serious though.
> 
> On Tuesday, September 16, 2003, at 03:30  PM, Grigsby, Garl wrote:
> 
> > I am assuming that most of you have heard that there is a) 
> a new SSH 
> > vulnerability and b) that there appears to be an exploit available. 
> > (See the link below for more information).
> >
> > What I would like to know is if anybody has seen somewhere 
> I can get 
> > my hands on the exploit. I would like to see what it looks 
> like when 
> > it attacks a machine. A friend of my might have already 
> been hit. He 
> > saw some unusual activity on his system and pulled the network 
> > connection, but we are not sure if he has been root'd or 
> not. I would 
> > like to try this on one of my systems and see what shows in 
> the logs.
> >
> > Thanks,
> > Garl
> >
> > http://slashdot.org/articles/03/09/16/1327248.shtml?tid=126&tid=172
> >
> > 
> ==============================================================
> =========
> > Garl R. Grigsby
> > Senior Customer Applications Engineer - I-DEAS CAE & FEMAP Support
> > 
> --------------------------------------------------------------
> ---------
> > EDS PLM Solutions                                 Phone: 
> (800) 955-0000
> > Global Technical Access Center                      FAX: 
> (541) 342-8277
> > 1750 Willow Creek Circle               Email: 
> [EMAIL PROTECTED]
> > Eugene, OR 97402                  Internet: 
> http://support.plms-eds.com
> > 
> ==============================================================
> =========
> >    -FEA makes a good engineer great, and a poor engineer dangerous-
> > 
> ==============================================================
> =========
> >
> > _______________________________________________
> > EuG-LUG mailing list
> > [EMAIL PROTECTED]
> > http://mailman.efn.org/cgi-bin/listinfo/eug-lug
> >
> >
> --
> "The Internet is falling" --C. Little 2003
> 
> _______________________________________________
> EuG-LUG mailing list
> [EMAIL PROTECTED]
> http://mailman.efn.org/cgi-bin/listinfo/eug-lug
> 

_______________________________________________
EuG-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

Reply via email to