Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Tue, 25 Jun 2002 22:28:52 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Tue, 25 Jun 2002 22:28:51 -0400 Received: from smtp.tscnet.net ([66.152.64.20]:24510 "EHLO smtp.tscnet.net") by vger.kernel.org with ESMTP id ; Tue, 25 Jun 2002 22:28:51 -0400 To: linux-kernel@vger.kernel.org Subject: OpenSSH exploit. Message-ID: <1025058532.3d1926e4c9488@mail.tscnet.net> Date: Tue, 25 Jun 2002 19:28:52 -0700 (PDT) From: Brad Dameron MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7BIT User-Agent: IMP/PHP IMAP webmail program 2.2.4 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 456 Lines: 12 I am on remote email so not sure if this was posted. Check out http://www.openssh.org There is a remote exploit for OpenSSH up to 3.3 which they had just released. Just thought most would like to know this. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/