Vulnerability Development mailing list archives

Re: ssh-1.2.27 remote buffer overflow - exploitable -- OFF TOPIC


From: Ken.Williams () EY COM (Ken Williams)
Date: Wed, 10 Nov 1999 09:33:31 -0600


Additionally, certain network configurations predicate the use of ssh1 for a variety of compatibility reasons.

An example is Solaris 2.51/2.6 + Kerberos + AFS.

Respectfully,

ken

bsmargiassi () SKYWEB NET on 11/09/99 11:34:24 PM

Please respond to bsmargiassi () SKYWEB NET@Internet
To:     VULN-DEV () SECURITYFOCUS COM@Internet
cc:     
Subject:        Re: ssh-1.2.27 remote buffer overflow - exploitable -- OFF TOPIC

----- Original Message -----
From: Frank <foofc7ca () SOFTHOME NET>

This is submitted to the Freebsd bug tracking system, although there are
doubtless other vendors who leave this package, despite the existence of the
ssh-2.X.

ssh 1.x is usually used because neither 1.x or 2.x are really free software,
but 1.x's license at least allows for non-commercial use in a commercial
setting. The 2.x license states that any use in a commercial setting
requires purchasing a $500 license. Hence the lsh and OpenSSH projects. This
will probably keep 2.x from ever really catching on outside universities.

bill

*******************************************************************************
Note:          The information contained in this message may be privileged and confidential and protected from 
disclosure.  If the reader of this message is not the intended recipient, or an employee or agent responsible for 
delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or 
copying of this communication is strictly prohibited. If you have received this communication in error, please notify 
us immediately by replying to the message and deleting it from your computer.  Thank you.  Ernst & Young LLP
*******************************************************************************


Current thread: