[nsp-sec] ASN list with weak Debian/OpenSSL keys

Gabriel Iovino giovino at ren-isac.net
Fri Jan 23 11:20:11 EST 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Florian Weimer wrote:
> The following hosts use SSL certificates on port 443/TCP which are
> affected by CVE-2008-0166 and should be considered compromised. 

Sanitized notifications will be sent to the following:

7018  | 12.108.93.221   | warriornet.rc.edu
40127 | 134.174.150.107 | drosophila.med.harvard.edu

As always, to any EDUs that are also NSP-SEC members, I apologize for
the duplication.

Thank you

Gabe

- --
Gabriel Iovino
Principal Security Engineer, REN-ISAC
http://www.ren-isac.net
24x7 Watch Desk +1(317)278-6630
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkl57joACgkQwqygxIz+pTt5UACeOH5xYvT8iZWRFYv/a6ZoweSm
GWQAnROzFQeWVbLk0fdhkOjmPf1bhcxe
=yHyS
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list