ID |
CVE-2006-0883
|
Summary |
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
-
cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 20-07-2017 - 01:30) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
refmap
via4
|
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2006-08-30 | organization | Red Hat | statement | This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4. |
|
Last major update |
20-07-2017 - 01:30 |
Published |
07-03-2006 - 02:02 |
Last modified |
20-07-2017 - 01:30 |