Quote:
Originally posted by Hooper
ssh is perfectly secure. the exploit has been patched, but the exploit is largely misunderstood as well.
yes, it's a buffer overflow attack.. but it is one that requires the attacker to *already* be logged into an ssh client..
so they would have to already have a working user/pass in order to use the exploit.
|
Interesting. I was suggested to use PuTTy,
http://www.chiark.greenend.org.uk/~sgtatham/putty/, for an SSH client and shut off telnet access to my servers completely. Have you heard of it? If so, how is it?