Author: Bob George Date: Subject: SSH - Preparing for the big one (was Re: SSH Exploit Revealed (fwd))
Jay wrote:
>*** OpenSSH Remote Root Exploit ***
>
>Hey all. I just sent this to AZIPA and considering the severe impact of a
>remote root exploit, and the fact that many of you are probably running
>OpenSSH, I thought I'd forward it to PLUG too. Details below:
> I've been following this with some concern since I run ssh for my little
routing lab. That *used* to make me feel better.
Anyhow, I'm running Debian and just did an apt-get dist-upgrade to
OpenSSH 3.3p1-0.0potato6. I run sshd only on a non-default port *not*
covered by nmap by default. I think I'm in pretty good shape, but wanted
to check with others and see if there are any other recommendations
(short of shutting it off).
I also noticed the following in my log today. I had updated to 3.3 a
couple of days ago, so that's what was running when this showed. I just
don't know enough about the innards of ssh to know if this is an issue:
Jun 26 07:50:09 localhost sshd[14694]: fatal: mm_request_send: write
Thanks to logcheck, things like that get noticed. That's the only
occurence, and everything else looks like normal activity.