Bugtraq mailing list archives
Re: Some revelations about ssh and stackpatch
From: peak () kerberos troja mff cuni cz (Pavel Kankovsky)
Date: Tue, 3 Nov 1998 22:13:15 +0100
On Mon, 2 Nov 1998, M.C.Mar wrote:
execl("/path_to_sshd/sshd","AAAAAA....[about 2000]",0); 'Cos I have stackpatch applied I saw something very strange in my logs: Nov 2 16:29:52 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: Server listening on port 22. Nov 2 16:29:52 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: Generating 768 bit RSA key. Nov 2 16:29:53 emsi <BUFFER OVERRUN ATTEMPT>[21738]: log: RSA key generation complete.
"<BUFFER OVERRUN ATTEMPT>" means that syslog() in (Linux) libc does not like your argv[0], this is not a feature or bug or anything of sshd --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "You can't be truly paranoid unless you're sure they have already got you."
Current thread:
- Some revelations about ssh and stackpatch M.C.Mar (Nov 02)
- Re: Some revelations about ssh and stackpatch Pavel Kankovsky (Nov 03)
- <Possible follow-ups>
- Re: Some revelations about ssh and stackpatch Alan J Rosenthal (Nov 03)
- Re: Some revelations about ssh and stackpatch Andy Church (Nov 04)