SSH issues...
Thomas Mondoshawan Tate
plug-discuss@lists.PLUG.phoenix.az.us
Tue, 4 Dec 2001 19:51:42 -0700
--OgqxwSJOaUobr8KG
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Tue, Dec 04, 2001 at 06:43:24PM -0800, Lowell Hamilton wrote:
> That has the signature of an exploited machine. I have seen several of
> these with the same issues. When people exploit the CRC-32 ssh hole,
> the rootkits disable ssh to keep others from using the same exploit,
> and it has the affect of locking legit users out as well. I'm not
> saying it's guaranteed to be it, but it is possible. If you used any
> redhat distribution or several others they come default with an old
> (pre v2.9) OpenSSH which is vulnerable.
>=20
> Lowell
I built this machine from the ground up from source copies of the latest
distributions of each package. I'm running OpenSSH_3.0p1, with protocols
1.5/2.0. The system was just recently installed to the outside world a few
seconds ago, so it's not possible for it to be rooted this early. =3Dop
--=20
Thomas "Mondoshawan" Tate
phoenix@psy.ed.asu.edu
http://tank.dyndns.org
--OgqxwSJOaUobr8KG
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE8DYu+Yp5mUsPGjjwRAveEAKC3OZFb6z+mMyGUpL8c8hD149QkOwCfczGU
m3b3CeKPAabufFQg9/dMtQM=
=qpz8
-----END PGP SIGNATURE-----
--OgqxwSJOaUobr8KG--