A new bug in Open SSH allows attackers to brute force attack Windows by having 2 minutes to use as many passwords as possibly, instead of being locked out at 6 or 8. I am not sure of the criticality of this bulletin, but is likely to affect multiple products.
Source: http://www.welivesecurity.com/2015/...urce=wls&utm_medium=twitter&utm_campaign=news (ESET's Blog).
I will try to leave the comments open for further interpretation.
Source: http://www.welivesecurity.com/2015/...urce=wls&utm_medium=twitter&utm_campaign=news (ESET's Blog).
I will try to leave the comments open for further interpretation.