Displaying 5 results from an estimated 5 matches for "unexploit".
Did you mean:
exploit
2014 Feb 28
5
Call for testing: OpenSSH 6.6
...92
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
sandbox modes, as it is reachable if the connection is terminated
during the pre-auth phase.
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
parsing. Minimum key length checks render this bug unexploitable to
compromise SSH 1 sessions.
* sshd_config(5): clarify behaviour of a keyword that appears in
multiple matching Match blocks. bz#2184
* ssh(1): avoid unnecessary hostname lookups when canonicalisation is
disabled. bz#2205
* sshd(8): avoid sandbox violation crashes in GSSAPI code...
2001 Nov 19
1
OpenSSH 3.0.1
...y allow an attacker to authenticate
if -- and only if -- the administrator has enabled KerberosV.
By default, OpenSSH KerberosV support only becomes active
after KerberosV has been properly configured.
An excessive memory clearing bug (which we believe to be
unexploitable) also exists, but since this may cause daemon
crashes, we are providing a fix as well.
Various other non-critical fixes (~& support and more).
OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller and Ben Lindstrom.
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...92
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
sandbox modes, as it is reachable if the connection is terminated
during the pre-auth phase.
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
parsing. Minimum key length checks render this bug unexploitable to
compromise SSH 1 sessions.
* sshd_config(5): clarify behaviour of a keyword that appears in
multiple matching Match blocks. bz#2184
* ssh(1): avoid unnecessary hostname lookups when canonicalisation is
disabled. bz#2205
* sshd(8): avoid sandbox violation crashes in GSSAPI code...
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...92
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
sandbox modes, as it is reachable if the connection is terminated
during the pre-auth phase.
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
parsing. Minimum key length checks render this bug unexploitable to
compromise SSH 1 sessions.
* sshd_config(5): clarify behaviour of a keyword that appears in
multiple matching Match blocks. bz#2184
* ssh(1): avoid unnecessary hostname lookups when canonicalisation is
disabled. bz#2205
* sshd(8): avoid sandbox violation crashes in GSSAPI code...
2009 Apr 01
10
FOR IMMEDIATE RELEASE: NEW CHANNEL DRIVER FOR ASTERISK RELEASED TODAY
...of
this new module is to add audio and video capabilities to
microblogging, making the popular microblogging networks a new
platform for VoIP and IP realtime communication.
- "I have seen that the microblogging solutions building on the social
network infrastructure have had enourmous unexploited capabilities",
says Mill Biller at Digium, "I've used it for a long time both
personally and for the company and we realized early that by adding
IAX2 support, we could now take these platforms one giant leap forward
by adding realtime multimedia. I can now spend evenings ch...