[VulnWatch] Proof of Concept Code for OpenSSHFrom: email@example.com
- Previous message: Hank Leininger: "[VulnWatch] ftp.bitchx.org's ircii-pana-1.0c19.tar.gz is backdoored"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org To: email@example.com, firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, email@example.com, firstname.lastname@example.org Date: Mon, 1 Jul 2002 10:32:00 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Remote OpenSSH exploit for 2.9.9-3.3.
Check out our official mirror while we work on the bugtraq.org hosting situation, http://www.immunitysec.com/GOBBLES/ (thanks bob!), we have a new comic posted and some other miscellaneous stuff.
If you haven't patched your sshd yet, you're probably running OpenBSD.
- -GOBBLES Security
"For the love of God, we won't shut up."
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com
-----END PGP SIGNATURE-----
- application/x-gzip attachment: sshutup-theo.tar.gz
- text/plain attachment: sshutup-theo.tar.gz.sig