tugrik: (Default)
[personal profile] tugrik
As [livejournal.com profile] reality_fox just found out the hard way, there's a new SSH exploit in the wild. It affects Debian, Gentoo, RedHat and OpenBSD systems (or anything using OpenSSH prior to v3.7). You should close your SSH ports immediately and then go get and apply the SSH patches going online now. I'm doing that at my office in the background while submitting this LJ entry.

Slashdot has more info on the specific bits. Here's a quick cut-paste for redhat users:

1.- Download the file openssh-3.7p1-1.src.rpm from any of the mirrors. For example:
ftp://ftp.easynet.be/openssh/portable/rpm/SRPMS/op enssh-3.7p1-1.src.rpm

2.- Build an .rpm for your RedHat Linux version:

# rpm --rebuild openssh-3.7p1-1.src.rpm

3.- Upgrade your OpenSSH packages:

# rpm -Fvh /usr/src/redhat/RPMS/i386/openssh-*.rpm

4.- Re-start your sshd daemon:

service sshd restart


This is a serious security hole. Many machines are being owned. Good luck on getting through to RedHat to get the 3.7 upgrade... just keep trying!

Date: 2003-09-16 01:18 pm (UTC)
From: [identity profile] tugrik.livejournal.com
Thank you. :) I was about to reply in the same fashion.

The war at work goes well. We firewalled everything (a few SSH ports were opened through a few firewalls here and there) and are patching like mad. All done now, I think.

Profile

tugrik: (Default)
tugrik

March 2010

S M T W T F S
 1234 56
78 910 111213
1415 16 17 181920
21222324252627
28293031   

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 24th, 2026 09:10 am
Powered by Dreamwidth Studios