When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Exploit Code Posted for SSH Flaws

eWeek Reports that subscribers to the BugTraq security mailing list got a belated and unwanted Christmas present over the weekend when someone posted exploit code for a set of recently discovered flaws in the SSHv2 protocol. The code is designed to exploit one of the vulnerabilities on the Putty SSH client.

Putty is a freeware SSH and Telnet client for Windows systems. The BugTraq message, which contained the usual disclaimer that the code was for "educational/testing purposes" only, was posted by the security research division of a Spanish organization called I-Proyectos.

The SSH (secure shell) protocol is a transport layer protocol that enables clients to connect securely to a remote server. It's often used for remote administration purposes. The end result of an exploitation of one of the vulnerabilities varies by vendor and vulnerability, but in some cases could allow attackers to run code on remote machines.

Other effects include denial-of-service. Rapid 7 Inc., the New York-based security company that found the vulnerabilities, only tested SSHv2 implementations. Most of the flaws involve memory access violations, and all of them are found in the greeting and key-exchange phase of the SSH transmission.

News source: Winbeta

Report a problem with article
Next Article

UK gets 802.11g

Previous Article

AMD Athlon™ XP processor Mods for Fsb of 166Mhz and 220mhz

Join the conversation!

Login or Sign Up to read and post a comment.

-1 Comments - Add comment