Forwarded to the openssl-users mailing list to receive broader audience.

Best regards,
        Lutz
        
----- Forwarded message from "Hebert, Chris" <[EMAIL PROTECTED]> -----

X-Original-To: [EMAIL PROTECTED]
X-Original-To: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
From: "Hebert, Chris" <[EMAIL PROTECTED]>
To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>
Cc: "Ciechanowicz, Margaret" <[EMAIL PROTECTED]>
Subject: OpenSSL SSL2 master key buffer overflow
Date: Thu, 15 Jul 2004 12:12:30 -0400
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Virus-Scanned: by amavisd 0.1
X-Virus-Scanned: by amavisd 0.1

We have just been informed that a pc on our network has attempted the
following attack on another network's webserver "OpenSSL SSL2 master key
buffer overflow". We have taken the pc off line and are trying to find the
source, are there any lists of known viruses or malicious programs which
exploit this vulnerability that we could review to help point to the
culprit? Our Norton Antivirus software does not detect any viruses.

The OS of the pc in question is Windows 2000 pro.

Thanks

Chris Hebert
State of Vermont
Department of Finance
[EMAIL PROTECTED]


----- End forwarded message -----

-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to