Vulnerability: SSH Implementations

CERT Advisory has warned multiple vendors' implementations of the secure shell (SSH) transport layer protocol contain vulnerabilities that could allow a remote attacker to execute arbitrary code with the privileges of the SSH process or cause a denial of service.

Secure shell (SSH) protocol implementations in SSH clients and servers from multiple vendors are all affected.

For more, see here.

Join the newsletter!

Error: Please check your email address.

More about CERT Australia

Show Comments