OpenSSH Key Based Source IP Access Control Bypass Vulnerability

There is no code or utility besides the ssh client and a keypair required to exploit this vulnerability.


 

Privacy Statement
Copyright 2010, SecurityFocus