OpenSSH 3.0.1 Released

    Date19 Nov 2001
    CategoryCryptography
    3053
    Posted ByAnthony Pell
    A security hole that may allow an attacker to authenticate if -- and only if -- the administrator has enabled KerberosV. By default, OpenSSH KerberosV support only becomes active after KerberosV has been properly configured.. . . A security hole that may allow an attacker to authenticate if -- and only if -- the administrator has enabled KerberosV. By default, OpenSSH KerberosV support only becomes active after KerberosV has been properly configured.
      Subject: OpenSSH 3.0.1     Date: Mon, 19 Nov 2001 17:13:02 +0100     From: This email address is being protected from spambots. You need JavaScript enabled to view it. Reply-To: This email address is being protected from spambots. You need JavaScript enabled to view it.       To: This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.       CC: This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.,  This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.  OpenSSH 3.0.1 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly.  OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support.  We would like to thank the OpenSSH community for their continued support and encouragement.  Important Changes: ==================          A security hole that may allow an attacker to authenticate         if -- and only if -- the administrator has enabled KerberosV.         By default, OpenSSH KerberosV support only becomes active         after KerberosV has been properly configured.          An excessive memory clearing bug (which we believe to be         unexploitable) also exists, but since this may cause daemon         crashes, we are providing a fix as well.          Various other non-critical fixes (~& support and more).  OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt, Kevin Steves, Damien Miller and Ben Lindstrom. 
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"5","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.