Re: OpenSSH 3.5p1

From: H D Moore (sflist@digitaloffense.net)
Date: Thu Jan 12 2006 - 16:37:20 EST


Most systems running that version of OpenSSH are still using an
exploitable version of the 'zlib' library. Technically, you can trigger
the zlib bug prior to authentication (protocol 2, MSG_IGNORE requests),
but getting a shell out of it seems difficult.

-HD

On Wednesday 11 January 2006 16:50, Farz Hem wrote:
> Is there any problem with 3.5p1 that can actually be exploited? I want
> to but all the supposed exploits with this version that I can find are
> "rumored," so my boss doesn't want me to touch the servers unless
> there actually is a possibility of security breaching. If there is
> one, please send maybe a proof of concept or an explanation.

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:22 EDT