|
ssh is perfectly secure. the exploit has been patched, but the exploit is largely misunderstood as well.
yes, it's a buffer overflow attack.. but it is one that requires the attacker to *already* be logged into an ssh client..
so they would have to already have a working user/pass in order to use the exploit.
it is largely a problem on shared systems because the attacker can get root priveleges which he/she should not have.
__________________
<a href="http://www.adultplatinum.com/"><img src="http://www.adult.com/wmbanners/10dcash-468x60.gif"></a>
|