On Mon, 24 Jun 2002 23:00:46 -0500
Paul Baker <[EMAIL PROTECTED]> wrote:
> In other words, if a malicious ssh request comes from an ip that is 
> already denied via tcp_wrapper support in ssh, will it still be able
> to exploit OpenSSH < 3.3?

We have no way of being sure, since the nature of the exploit and the
specifics aren't being told.

However, supposedly, you need to be able to talk to the sshd in order to
exploit it. So if nothing (or nothing malicious) can open a connection,
you're fine.

-- 
________________________________________________________________________
\ David B. Harris, Systems administrator   |   http://www.terrabox.com /
/  [EMAIL PROTECTED], [EMAIL PROTECTED]     |     http://eelf.ddts.net  \
\======================================================================/
/ Clan Barclay motto: Aut agere, aut mori.  (Either action, or death.) \
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Attachment: pgpINoqw3g2tj.pgp
Description: PGP signature

Reply via email to