Thread: Hackers
View Single Post
Old 01-30-2005, 07:09 PM  
riddler
Confirmed User
 
Join Date: Oct 2004
Location: up in gang bang heaven
Posts: 3,726
Quote:
Sunday, January 30, 2005

OpenSSH 3.7.0 Buffer Overflow
Risk Level: High
Category: SSH Servers
Description: OpenSSH versions prior to 3.7.1 are vulnerable to buffer management errors.
How To Fix: Upgrade to 3.7.1 or the latest build immediately.
Related Links: OpenSSH Advisory (http://www.openssh.com/txt/buffer.adv)
CVE: CAN-2003-0695 (http://cve.mitre.org/cgi-bin/cvename...=CAN-2003-0695)
- Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CAN-2003-0693.
IAV:
BugtraqID:
Affected Machines: IP Address Machine Name OS
064.158.165.018 unknown No Matches
- TCP:22

Theres a security report from your site urlsx, I ran every known exploit check up to this date on it.
riddler is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote