just update it!
2009/7/8 Leandro Minatel <leandromina...@gmail.com> > > > On Wed, Jul 8, 2009 at 11:38 AM, Norbert Preining <prein...@logic.at>wrote: > >> On Mi, 08 Jul 2009, Leandro Minatel wrote: >> > Right you are!, but, don't forget that there are more than 65500 ports >> to >> >> ??? Are you talking about trying the exploit on every single port? Then >> they would really be stupid. Calling nmap makes that much faster. >> >> No the code must be fixed if there is a hole, nothing else helps but >> turing off ssh. >> >> Best wishes >> >> Norbert >> >> >> ------------------------------------------------------------------------------- >> Dr. Norbert Preining <prein...@logic.at> Vienna University of >> Technology >> Debian Developer <prein...@debian.org> Debian TeX >> Group >> gpg DSA: 0x09C5B094 fp: 14DF 2E6C 0307 BE6D AD76 A9C0 D2BF 4AA3 09C5 >> B094 >> >> ------------------------------------------------------------------------------- >> LUSBY (n.) >> The fold of flesh pushing forward over the top of a bra which is too >> small for the lady inside it. >> --- Douglas Adams, The Meaning of Liff >> >> >> -- >> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org >> with a subject of "unsubscribe". Trouble? Contact >> listmas...@lists.debian.org >> >> > No, of course not. Maybe I expressed myself "not in a proper way", sorry, > english is not my natural language. AFAIK, nmap, by default, scan ports from > 1 to 1024 and those listed in nmap-services. This allows me to "hide" > ssh-server for the majority of mortals. > > BTW, I agree with you, the code must be fixed, no doubt at all. > > Regards > Leandro >