TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Qualys Security Advisory: MitM and DoS attacks against OpenSSH client and server

4 点作者 mkeeter3 个月前

1 comment

westurner3 个月前
MitM-able since 6.8 (December 2014) only if<p>&gt; <i>VerifyHostKeyDNS is &quot;yes&quot; or &quot;ask&quot; (it is &quot;no&quot; by default),</i><p>And DOS-able since 9.5 (2023) because of a new <i>ping</i> command.<p>&gt; <i>To confirm our suspicion, we adopted a dual strategy:</i><p>&gt; <i>- we manually audited all of OpenSSH&#x27;s functions that use &quot;goto&quot;, for missing resets of their return value;</i><p>&gt; <i>- we wrote a CodeQL query that automatically searches for functions that &quot;goto out&quot; without resetting their return value in the corresponding &quot;if&quot; code block.</i>