[Info-vax] Is HP's TCP/IP Services for OpenVMS vulnerable?
Arne Vajhøj
arne at vajhoej.dk
Sat Aug 20 15:52:32 EDT 2011
On 8/20/2011 11:10 AM, Michael T. Davis wrote:
> In article<0ff9dbc7-09ea-4f2f-840a-8196c92fc914 at b9g2000prd.googlegroups.com>,
> Rod<rregier at dymaxion.ca> writes:
>
>>> "Michael T. Davis"<DAV... at ecr6.ohio-state.edu> wrote in messagenews:j2bh=
>> na$r7e$1 at news1.cse.ohio-state.edu...
>>>> We're running...
>>>
>>>> =A0HP TCP/IP Services for OpenVMS Alpha Version V5.6 - ECO 3
>>>> =A0on an AlphaServer DS15 running OpenVMS V8.3
>>
>> You can also get a modest jump on security issues by upgrading to the
>> current production release of the OpenVMS IP stack, which is 5.7 ECO
>> 2.
>>
>> I'm running it on some systems including SSH usage w/o serious
>> operational issues.
>
> The "powers that be" here are basically just going by what Nessus
> tells them, and it bases this on the hello banner from the server. We don't
> have a support contract, but we do have access to newer releases. So, is
> there a newer release version wherein the SSH server reports a version of at
> least 3.2.2?
If they only care about getting a clean report and not about security,
then patch the EXE to display 3.2.2!
Arne
More information about the Info-vax
mailing list