[lug] SSH Vulnerability
Nate Duehr
nate at natetech.com
Fri Feb 9 11:17:06 MST 2001
Not sure if I trust them yet. I just wanted to get the word out and
have more eyeballs looking at the problem.
Other things I have read indicated to me that some vendors already have
fixes in current versions, others haven't responded.
Of course, this is causing a big stir at the office, so I gotta run for
now, but I'll post anything else useful I find.
On Fri, Feb 09, 2001 at 12:05:39PM -0700, Scott A. Herod wrote:
> Hi Nate,
>
> Just saw that. How does one interpret the patch by hand?
>
> --- deattack.c.orig Wed Feb 7 13:53:47 2001
> +++ deattack.c Wed Feb 7 13:54:24 2001
> @@ -79,7 +79,7 @@
> detect_attack(unsigned char *buf, word32 len, unsigned char *IV)
> {
> static word16 *h = (word16 *) NULL;
> - static word16 n = HASH_MINSIZE / HASH_ENTRYSIZE;
> + static word32 n = HASH_MINSIZE / HASH_ENTRYSIZE;
> register word32 i, j;
> word32 l;
> register unsigned char *c;
>
>
> This means replace the "static word16" with "static word32", correct?
>
> Do you trust the razor.bindview.com website? There's nothing so
> far on www.cert.org or www.nipc.gov.
>
> Scott
>
> Nate Duehr wrote:
> >
> > Slashdot and other sources are reporting that there is a new published
> > exploit for pretty much all versions of SSH, not including OpenSSH
> > 2.4.0.
> >
> > The page below also details various vendor responses with F-Secure being
> > the worst. (No response at all so far back to the reporting party.)
> >
> > Here's the people reporting it:
> >
> > http://razor.bindview.com/publish/advisories/adv_ssh1crc.html
> >
> > --
> > Nate Duehr <nate at natetech.com>
> _______________________________________________
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
--
Nate Duehr <nate at natetech.com>
GPG Key fingerprint = DCAF 2B9D CC9B 96FA 7A6D AAF4 2D61 77C5 7ECE C1D2
Public Key available upon request, or at wwwkeys.pgp.net and others.
More information about the LUG
mailing list