[Gllug] [Fwd: SSH Security Advisory: Centos (and other distros)]

Harry Rickards hrickards at l33tmyst.com
Wed Jul 8 15:49:23 UTC 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Jon Fautley wrote:
> On Wed, 08 Jul 2009 16:36:17 +0100
> Harry Rickards <hrickards at l33tmyst.com> wrote:
> 
>> It's not a 'random' person, they're my VPS host. It looks as though it
>> might by the zero day 0pen0wn exploit.
> 
> Well, it's good that you've confirmed it was them that sent it. I take
> it you'll be verifying the origins of the packages before you install
> them, too? :)
> 
> Oh, and I'm still not aware that anyone's confirmed the existence of
> the fabled "0pen0wn" exploit, have they?
> 
> Cheers,
> 
> Jon
> 
- From the looks of the replies and the links on a debian-user thread
about it, it looks like changing the port and using the latest version
of ssh should be okay for now. According to isc.sans.org
(http://isc.sans.org/diary.html?storyid=6742), they've received some
emails that say it's true, and some say it's a cover up for a sysadmins
mistake.

- --
Many thanks
Harry Rickards (GPG Key ID:58449F6F)

- -----BEGIN GEEK CODE BLOCK-----
Version: 3.1
GAT/GCM/GCS/GCC/GIT/GM d? s: a? C++++ UL++++ P- L+++ E--- W+++ N o K+
w--- O- M- V- PS+  PE Y+ PGP++ t 5 X R tv-- b+++ DI D---- G e* h! !r y?
- ------END GEEK CODE BLOCK------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iJwEAQECAAYFAkpUwAIACgkQ+9DWHFhEn29wmgP/V4pJtxzzffBeBt/xwBYZ2629
UVqgXZrRKeS6x7RbbNqcOIxvij+MjPPMmaz78l0JEUX+uaX//wQ4RpTELHui/wSv
8j2kILYdRHBJLRgQ69OZLkr2JCyFmmNkV5xMWB/94UvyamDev1Oj6DBKpG+a1YKI
Op/1JmwckUYEBUQIOTU=
=QGds
-----END PGP SIGNATURE-----
-- 
Gllug mailing list  -  Gllug at gllug.org.uk
http://lists.gllug.org.uk/mailman/listinfo/gllug




More information about the GLLUG mailing list