[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[orca-users:04608] 【緊急情報】Yet another bad Windows XP/2000/NT hole; OpenSSH remote exploit
- To: orca-biz@xxxxxxxxxxxxxx, orca-testers@xxxxxxxxxxxxxx, orca-tech@xxxxxxxxxxxxxx, orca-users@xxxxxxxxxxxxxx
- Subject: [orca-users:04608] 【緊急情報】Yet another bad Windows XP/2000/NT hole; OpenSSH remote exploit
- From: 北岡 有喜 <ykitaoka@xxxxxxxxxxxxxxxxxxxxx>
- Date: Thu, 18 Sep 2003 07:56:43 +0900
- Cc: wami@xxxxxxxxxx, onomichi@xxxxxxxxxxxxxx
北岡有喜@国立京都病院医療情報部です。
LAからの緊急情報です。
Subject:
Yet another bad Windows XP/2000/NT hole; OpenSSH remote
exploit
Date:
16 Sep 2003 23:59:59 -0700
From:
Paul Eggert <eggert@xxxxxxxxxxx>
To:
tech@xxxxxxxxxxx
Last week Microsoft announced another serious security hole in its
RPCSS service. If you have a Windows box running Windows NT or later,
your box can be taken over by an attacker unless you install the patch
supplied by Microsoft Security Bulletin MS03-039. This is
particularly important if you have a laptop or home desktop that runs
outside our firewall.
Today OpenSSH announced some buffer management errors that may be
potentially exploitable. If you manage OpenSSH hosts visible to the
Internet, I suggest updating them to OpenSSH 3.7.1p1, or to the
relevant patched version of earlier OpenSSH releases. I have updated
all the internal Solaris development hosts at Twin Sun El Segundo.
The Debian advisory for this possible remote vulnerability is DSA-382.
References:
http://www.cert.org/advisories/CA-2003-23.html
http://www.cert.org/advisories/CA-2003-24.html
http://www.debian.org/security/2003/dsa-382
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
京都大学医学博士
北 岡 有 喜(きたおか ゆうき)
mailto:ykitaoka@xxxxxxxxxxxxxxxxxxxxx
臨床研修審査官(厚生労働省近畿厚生局総務課内)←月水金
Tel: 06-6942-2284(直通) Fax: 06-6946-1500
mailto:kitaoka-yuuki@xxxxxxxxxx
http://www.hosp.go.jp/~kinki
国立京都病院 医療情報部長/産科医長 ←火木
Tel: 075-645-8401(内線7232) Fax: 075-646-3127
mailto:ykitaoka@xxxxxxxxxxxxxxxxxxx
http://www.hosp.go.jp/~kyotolan
http://w3.hosp.go.jp/~hospnet (HOSPnet研究会)
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/