Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: 'openssh' vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Debian There is a vulnerability in openssh with X11 forwarding.

- ------------------------------------------------------------------------
Debian Security Advisory                                            Wichert Akkerman
November 18, 2000
- ------------------------------------------------------------------------

Package        : openssh
Problem type   : remote exploit
Debian-specific: no

The adv.fwd security advisory from OpenBSD reported a problem
with openssh that Jacob Langseth <> found: when
the connection is established the remote ssh server can force
the ssh client to enable agent and X11 forwarding.

This has been fixed in version 1.2.3-9.1 and we recommend
that you upgrade your openssh packages immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.2 alias potato
- ---------------------------------
  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
  Packages for sparc are not available at this moment; they
  will be announced later at
  Source archives: 
      MD5 checksum: 720a7ee40f334b5704a8acbc260ae0dc     
      MD5 checksum: e0c0987ec4e7b8eccd98dabbe75ea231 
      MD5 checksum: 6aad0cc9ceca55f138ed1ba4cf660349
  Architecture indendent archives:
      MD5 checksum: cb2bfd756f5d4fd52ae4656f9bd61420

  Alpha architecture:
      MD5 checksum: a8b51ca7b67cb0e5aeedac4fa301d18c
      MD5 checksum: bb58e19e240adfe940fbebe2364f6f35

  ARM architecture:
      MD5 checksum: 543e76b02e7cfdb35f9b92365dc4610b
      MD5 checksum: ed70bc90de326bfec9899f4ed0ac5b6d

  Intel ia32 architecture:
      MD5 checksum: a03ebc405c792bbef06d4f3235f0a0d3
      MD5 checksum: c1dfbadec6f9ef38b1ed9391bb1e8c52

  Motorola 680x0 architecture:
      MD5 checksum: dcdffa2a00132500621d4eb32ecbae9a
      MD5 checksum: e0059e6bfe72a14a18803a507884d194

  PowerPC architecture:
      MD5 checksum: 4354d03dc3030da57bb1ce91fac6247a
      MD5 checksum: 5419aab89a4270933849430efdc0c3d2

  These files will be moved into*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb stable/updates main
dpkg-ftp: dists/stable/updates/main
Mailing list:

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.