search for: unexploit

Displaying 5 results from an estimated 5 matches for "unexploit".

Did you mean: exploit
2014 Feb 28
5
Call for testing: OpenSSH 6.6
...92 * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace sandbox modes, as it is reachable if the connection is terminated during the pre-auth phase. * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum parsing. Minimum key length checks render this bug unexploitable to compromise SSH 1 sessions. * sshd_config(5): clarify behaviour of a keyword that appears in multiple matching Match blocks. bz#2184 * ssh(1): avoid unnecessary hostname lookups when canonicalisation is disabled. bz#2205 * sshd(8): avoid sandbox violation crashes in GSSAPI code...
2001 Nov 19
1
OpenSSH 3.0.1
...y allow an attacker to authenticate if -- and only if -- the administrator has enabled KerberosV. By default, OpenSSH KerberosV support only becomes active after KerberosV has been properly configured. An excessive memory clearing bug (which we believe to be unexploitable) also exists, but since this may cause daemon crashes, we are providing a fix as well. Various other non-critical fixes (~& support and more). OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt, Kevin Steves, Damien Miller and Ben Lindstrom.
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...92 * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace sandbox modes, as it is reachable if the connection is terminated during the pre-auth phase. * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum parsing. Minimum key length checks render this bug unexploitable to compromise SSH 1 sessions. * sshd_config(5): clarify behaviour of a keyword that appears in multiple matching Match blocks. bz#2184 * ssh(1): avoid unnecessary hostname lookups when canonicalisation is disabled. bz#2205 * sshd(8): avoid sandbox violation crashes in GSSAPI code...
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...92 * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace sandbox modes, as it is reachable if the connection is terminated during the pre-auth phase. * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum parsing. Minimum key length checks render this bug unexploitable to compromise SSH 1 sessions. * sshd_config(5): clarify behaviour of a keyword that appears in multiple matching Match blocks. bz#2184 * ssh(1): avoid unnecessary hostname lookups when canonicalisation is disabled. bz#2205 * sshd(8): avoid sandbox violation crashes in GSSAPI code...
2009 Apr 01
10
FOR IMMEDIATE RELEASE: NEW CHANNEL DRIVER FOR ASTERISK RELEASED TODAY
...of this new module is to add audio and video capabilities to microblogging, making the popular microblogging networks a new platform for VoIP and IP realtime communication. - "I have seen that the microblogging solutions building on the social network infrastructure have had enourmous unexploited capabilities", says Mill Biller at Digium, "I've used it for a long time both personally and for the company and we realized early that by adding IAX2 support, we could now take these platforms one giant leap forward by adding realtime multimedia. I can now spend evenings ch...