Chinaunix首页 | 论坛 | 博客
  • 博客访问: 73165
  • 博文数量: 14
  • 博客积分: 1536
  • 博客等级: 上尉
  • 技术积分: 135
  • 用 户 组: 普通用户
  • 注册时间: 2008-04-07 16:21
文章分类
文章存档

2012年(1)

2011年(4)

2010年(2)

2008年(7)

分类: LINUX

2008-04-09 13:30:03

最近Openssh漏洞暴多,请升级至最新的 5.0P1  版
 
OpenSSH before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
 
OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
阅读(2317) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~