Vulnerability: SSH Implementations

CERT Advisory has warned multiple vendors' implementations of the secure shell (SSH) transport layer protocol contain vulnerabilities that could allow a remote attacker to execute arbitrary code with the privileges of the SSH process or cause a denial of service.

Secure shell (SSH) protocol implementations in SSH clients and servers from multiple vendors are all affected.

For more, see here.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about CERT Australia

Show Comments
[]