just update it!

2009/7/8 Leandro Minatel <leandromina...@gmail.com>

>
>
> On Wed, Jul 8, 2009 at 11:38 AM, Norbert Preining <prein...@logic.at>wrote:
>
>> On Mi, 08 Jul 2009, Leandro Minatel wrote:
>> > Right you are!, but, don't forget that there are more than 65500 ports
>> to
>>
>> ??? Are you talking about trying the exploit on every single port? Then
>> they would really be stupid. Calling nmap makes that much faster.
>>
>> No the code must be fixed if there is a hole, nothing else helps but
>> turing off ssh.
>>
>> Best wishes
>>
>> Norbert
>>
>>
>> -------------------------------------------------------------------------------
>> Dr. Norbert Preining <prein...@logic.at>        Vienna University of
>> Technology
>> Debian Developer <prein...@debian.org>                         Debian TeX
>> Group
>> gpg DSA: 0x09C5B094      fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5
>> B094
>>
>> -------------------------------------------------------------------------------
>> LUSBY (n.)
>> The fold of flesh pushing forward over the top of a bra which is too
>> small for the lady inside it.
>>                        --- Douglas Adams, The Meaning of Liff
>>
>>
>> --
>> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
>> with a subject of "unsubscribe". Trouble? Contact
>> listmas...@lists.debian.org
>>
>>
> No, of course not. Maybe I expressed myself  "not in a proper way", sorry,
> english is not my natural language. AFAIK, nmap, by default, scan ports from
> 1 to 1024 and those listed in nmap-services. This allows me to "hide"
> ssh-server for the majority of mortals.
>
> BTW, I agree with you, the code must be fixed, no doubt at all.
>
> Regards
> Leandro
>

Reply via email to