mailing list archives
Re: SSH-1.2.27 & RSAREF2 exploit
From: wakko () WTOWER COM (Wakko Ellington Warner-Warner III)
Date: Wed, 15 Dec 1999 04:50:08 -0500
On Tue, 14 Dec 1999, [iso-8859-1] Iv√°n Arce wrote:
Ok, here is the exploit for SSH-1.2.27 compiled with RSAREF2.
It was tested against sshd running on Linux (Redhat 6.0) and OpenBSD
from a Linux Redhat 6.0 box.
The exploit is more or less "script-kid-proof" since if it doesnt work a
debugging, coding and probably crypto skills are needed to make it work.
Why was the code even posted to the list if it's basically useless? I
wanted to check out my own machine with a working exploit, and I'm sure
most of the people that read this list wanted to do the same. Now we're
going to have to wait for someone to take the time to "fix" your code up
and repost it to the list in working form. Posting broken code that
anything beyond a trivial amount of work won't fix is just a waste of
- Alex Prestin
"Despite the fact that all of my information about drugs is either
anecdotal or based on biased, often wildly inaccurate propaganda, I
think I am completely qualified to label all those who use drugs as
unworthy of the full-human status that I claim just for having a
beating heart (pumping squeaky-clean blood, no less!)" - seen on /.
- - - -36- - - -
NIC: AP5514 http://bitey.net wakko () bitey net
Security Vulnerability in VVOS TGP Aleph One (Dec 14)
CERT Advisory CA-99.15 - Buffer Overflows in SSH Daemon and RSAREF2 Library Aleph One (Dec 14)