Hi,
Saint says: "ssh versions 1.2.27 and earlier if compiled with the --with-rsaref option are vulnerable."
You should not take any complaint saint - or for that matter, nessus - has as a given fact. Security scanners can only give you hints on what _might_ be a vulnerable service and give false positives more often than not. BTW saint is obsolete, use nessus instead (latest version comes with SuSE 7.1).
"This problem can be fixed by upgrading to ssh-1.2.28. If this is not possible, then install the ssh patch "
Suse has latest patch which produces ssh-1.2.27-209 for SuSE 6.3/6.4 (this version was uploaded 15/Feb or so.) So i thought it looks like brand new vulnerability...
The RSAREF vulnarability is old and not related to the latest SuSE update. And it doesn't affect SuSE because, as you can find out for yourself typing "ssh -V", SuSE's version is not compiled against RSAREF.
Sincerely Yours, Gediminas Grigas mailto:gedas@kryptis.lt
Regards, Martin -- Martin Leweling Institut fuer Planetologie, WWU Muenster Wilhelm-Klemm-Str. 10, 48149 Muenster, Germany E-Mail (work): lewelin@uni-muenster.de