Skip to content

Commit cf31c20

Browse files
author
provos
committed
mention SSH-1 Daemon CRC32 Compensation Attack Detector problem.
okay deraadt@
1 parent 949b663 commit cf31c20

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

openssh/security.html

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,14 +68,21 @@ <h2><font color=#e00000>Security</font><hr></h2>
6868
connection rate, making the attack infeasible. Additionally, the
6969
Bleichenbacher oracle has been closed completely since January 29,
7070
2001.
71+
<p>
72+
<li>OpenSSH 2.3.0 and newer are not vulnerable to the
73+
"Feb 8, 2001: SSH-1 Daemon CRC32 Compensation Attack Detector Vulnerability",
74+
<a href="http://razor.bindview.com/publish/advisories/adv_ssh1crc.html">RAZOR Bindview Advisory CAN-2001-0144</a>.
75+
A buffer overflow in the CRC32 compensation attack detector can
76+
lead to remote root access. This problem has been fixed in
77+
OpenSSH 2.3.0. However, versions prior to 2.3.0 are vulnerable.
7178

7279
</dl>
7380

7481
<hr>
7582
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenSSH></a>
7683
7784
<br>
78-
<small>$OpenBSD: security.html,v 1.8 2001/02/07 22:42:26 provos Exp $</small>
85+
<small>$OpenBSD: security.html,v 1.9 2001/02/08 23:45:41 provos Exp $</small>
7986

8087
</body>
8188
</html>

0 commit comments

Comments
 (0)