On 6/13/06, Espen Grøndahl <[EMAIL PROTECTED]> wrote:


This could be used in a denial of service attack – or could be used to stop
( or at least annoy ) ssh bruteforcers J


no, the bruteforcers don't use ssh, but other programs that can be not
affected by this

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to