Full Disclosure mailing list archives
Re: re: openssh exploit code?
From: Shawn McMahon <smcmahon () eiv com>
Date: Mon, 20 Oct 2003 16:33:34 -0400
Frank Knobbe wrote:
heh... Nothing wrong with that statement. However, the severity of the issue (DoS vs. remote-root) would be helpful in determining if admins should yank the boxes during production, or wait to patch after hours.
Especially if one has boxes for which "after hours" is "once a quarter" or "never". I've got projects with both.
Attachment:
file:///tmp/nsmail.tmp
Description:
Attachment:
_bin
Description:
Current thread:
- Re: openssh exploit code?, (continued)
- Re: openssh exploit code? Henning Brauer (Oct 13)
- Re: openssh exploit code? Shawn McMahon (Oct 13)
- Re: openssh exploit code? S . f . Stover (Oct 19)
- re: openssh exploit code? mitch_hurrison (Oct 20)
- Re: re: openssh exploit code? S . f . Stover (Oct 20)
- Re: re: openssh exploit code? John Sage (Oct 20)
- Re: re: openssh exploit code? S . f . Stover (Oct 20)
- Re: re: openssh exploit code? Valdis . Kletnieks (Oct 20)
- Re: re: openssh exploit code? S . f . Stover (Oct 20)
- Re: re: openssh exploit code? pandora (Oct 20)
- Re: re: openssh exploit code? Frank Knobbe (Oct 20)
- Re: re: openssh exploit code? Shawn McMahon (Oct 20)
- Re: re: openssh exploit code? mitch_hurrison (Oct 20)
- Re: re: openssh exploit code? S . f . Stover (Oct 20)
