[nsp-sec] ASN list with weak Debian/OpenSSL keys
Gabriel Iovino
giovino at ren-isac.net
Fri Jan 23 11:20:11 EST 2009
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Florian Weimer wrote:
> The following hosts use SSL certificates on port 443/TCP which are
> affected by CVE-2008-0166 and should be considered compromised.
Sanitized notifications will be sent to the following:
7018 | 12.108.93.221 | warriornet.rc.edu
40127 | 134.174.150.107 | drosophila.med.harvard.edu
As always, to any EDUs that are also NSP-SEC members, I apologize for
the duplication.
Thank you
Gabe
- --
Gabriel Iovino
Principal Security Engineer, REN-ISAC
http://www.ren-isac.net
24x7 Watch Desk +1(317)278-6630
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkl57joACgkQwqygxIz+pTt5UACeOH5xYvT8iZWRFYv/a6ZoweSm
GWQAnROzFQeWVbLk0fdhkOjmPf1bhcxe
=yHyS
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list