
Full Disclosure mailing list archives
RE: Re: new openssh exploit in the wild! *isFAKE AS SH@!*
From: "Schmehl, Paul L" <pauls () utdallas edu>
Date: Fri, 19 Sep 2003 09:32:41 -0500
-----Original Message----- From: Adam Balogh [mailto:adam () vattnet net] Sent: Friday, September 19, 2003 7:59 AM To: Full Disclosure Subject: Re: [Full-disclosure] Re: new openssh exploit in the wild! *isFAKE AS SH@!* Probably a scriptkiddie or some random idiot. The fun part was it came up totally different offsets then i mean TOTALLY different each time you ran it and if you gave it a offset it would "work" no matter what. For those people who ran it.. change all your passwords. :)
Why bother? If you were stupid enough to run that obvious piece of crap, changing your password is the least of your worries. (In fact, if you run *anything* that's posted here without first checking it out thoroughly or if you don't understand code at all, you might as well run up the white flag right now.) Paul Schmehl (pauls () utdallas edu) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/~pauls/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- RE: Re: new openssh exploit in the wild! *isFAKE AS SH@!* Schmehl, Paul L (Sep 19)
- Re: Re: new openssh exploit in the wild! *isFAKE AS SH@!* Cael Abal (Sep 19)
- RE: Re: new openssh exploit in the wild! *isFAKE AS SH@!* Adam Balogh (Sep 22)
- <Possible follow-ups>
- RE: Re: new openssh exploit in the wild! *isFAKE AS SH@!* Brian Dinello (Sep 19)
- Re: Re: new openssh exploit in the wild! *isFAKE AS SH@!* Patrick Dolan (Sep 19)