X-MimeOLE: Produced By Microsoft Exchange V6.5
Received: by onstor-exch02.onstor.net 
	id <01C7F0AF.661EAA94@onstor-exch02.onstor.net>; Thu, 6 Sep 2007 09:57:32 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-class: urn:content-classes:message
Subject: RE: what version of OpenSSH are you running on the new 3.0.1.0 code?
Date: Thu, 6 Sep 2007 09:57:32 -0800
Message-ID: <BB375AF679D4A34E9CA8DFA650E2B04E022159D4@onstor-exch02.onstor.net>
In-Reply-To: <20070906072845.2dcbec72@ripper.onstor.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: what version of OpenSSH are you running on the new 3.0.1.0 code?
Thread-Index: AcfwkjxgvaybW2nFThyr65rOPigCugAG83/g
From: "Larry Scheer" <larry.scheer@onstor.com>
To: "Andy Sharp" <andy.sharp@onstor.com>,
	"Fred McFadden (Glasshouse)" <fredm@css.glasshouse.com>
Cc: "dl-cstech" <dl-cstech@onstor.com>

Fred,
   The direct answer to your question is OpenSSH 4.2p1.

Larry

-----Original Message-----
From: Andy Sharp=20
Sent: Thursday, September 06, 2007 7:29 AM
To: Fred McFadden (Glasshouse)
Cc: dl-cstech
Subject: Re: what version of OpenSSH are you running on the new 3.0.1.0
code?

Please remember that these machines are not meant to be run bare-assed
on the internet, but as internal appliances where their environment is
tightly controlled.

That being said, there are many very large, real, security holes in our
product besides this theoretical security hole.  Theoretical because it
has probably never been actually exploited even to crash the ssh
server, and because of the highly inflamitory "...possibly execute
arbitrary code..." which is obvious theoretical on it's best day.

Cheers,

a

On Thu, 6 Sep 2007 09:54:35 -0400 "Fred D. McFadden"
<fredm@css.glasshouse.com> wrote:

> Customer asks the below, can anyone answer? Thanks -Fred
> ---------------
> A new comment has been added to case 5806 by Server Manager.
> https://ssl.salesforce.com/500000000015x3tAAA
>=20
> ---------------- Comment: ---------------- Michael,
>=20
> BTW, what version of OpenSSH are you running on the new 3.0.1.0 code?
> Because OpenSSH 4.4 and earlier contain a signal handler race
> condition in the GSSAPI functionality which can lead to memory beeing
> free()'d twice. This flaw allows a remote attacker to crash the
> OpenSSH service and possibly execute arbitrary code on the server.
>=20
> Thanks,
>=20
> Yong
>=20
>=20
