Vulnerability Development mailing list archives
Re: ssh-1.2.27 remote buffer overflow - exploitable -- OFF TOPIC
From: Ken.Williams () EY COM (Ken Williams)
Date: Wed, 10 Nov 1999 09:33:31 -0600
Additionally, certain network configurations predicate the use of ssh1 for a variety of compatibility reasons. An example is Solaris 2.51/2.6 + Kerberos + AFS. Respectfully, ken bsmargiassi () SKYWEB NET on 11/09/99 11:34:24 PM Please respond to bsmargiassi () SKYWEB NET@Internet To: VULN-DEV () SECURITYFOCUS COM@Internet cc: Subject: Re: ssh-1.2.27 remote buffer overflow - exploitable -- OFF TOPIC ----- Original Message ----- From: Frank <foofc7ca () SOFTHOME NET>
This is submitted to the Freebsd bug tracking system, although there are
doubtless other vendors who leave this package, despite the existence of the ssh-2.X. ssh 1.x is usually used because neither 1.x or 2.x are really free software, but 1.x's license at least allows for non-commercial use in a commercial setting. The 2.x license states that any use in a commercial setting requires purchasing a $500 license. Hence the lsh and OpenSSH projects. This will probably keep 2.x from ever really catching on outside universities. bill ******************************************************************************* Note: The information contained in this message may be privileged and confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by replying to the message and deleting it from your computer. Thank you. Ernst & Young LLP *******************************************************************************
Current thread:
- Re: ssh-1.2.27 remote buffer overflow - exploitable -- OFF TOPIC Ken Williams (Nov 10)