Forwarded to the openssl-users mailing list to receive broader audience. Best regards, Lutz ----- Forwarded message from "Hebert, Chris" <[EMAIL PROTECTED]> -----
X-Original-To: [EMAIL PROTECTED] X-Original-To: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] From: "Hebert, Chris" <[EMAIL PROTECTED]> To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]> Cc: "Ciechanowicz, Margaret" <[EMAIL PROTECTED]> Subject: OpenSSL SSL2 master key buffer overflow Date: Thu, 15 Jul 2004 12:12:30 -0400 X-Mailer: Internet Mail Service (5.5.2653.19) X-Virus-Scanned: by amavisd 0.1 X-Virus-Scanned: by amavisd 0.1 We have just been informed that a pc on our network has attempted the following attack on another network's webserver "OpenSSL SSL2 master key buffer overflow". We have taken the pc off line and are trying to find the source, are there any lists of known viruses or malicious programs which exploit this vulnerability that we could review to help point to the culprit? Our Norton Antivirus software does not detect any viruses. The OS of the pc in question is Windows 2000 pro. Thanks Chris Hebert State of Vermont Department of Finance [EMAIL PROTECTED] ----- End forwarded message ----- -- Lutz Jaenicke [EMAIL PROTECTED] http://www.aet.TU-Cottbus.DE/personen/jaenicke/ BTU Cottbus, Allgemeine Elektrotechnik Universitaetsplatz 3-4, D-03044 Cottbus ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]