ID |
CVE-2006-4925
|
Summary |
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.0 (as of 17-10-2018 - 21:40) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
refmap
via4
|
bugtraq | - 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server
| confirm | | mandriva | MDKSA-2006:179 | misc | http://bugs.gentoo.org/show_bug.cgi?id=148228 | openpkg | OpenPKG-SA-2006.022 | secunia | | suse | - SUSE-SA:2006:062
- SUSE-SR:2006:024
|
|
statements
via4
|
contributor | Joshua Bressers | lastmodified | 2006-10-31 | organization | Red Hat | statement | Red Hat does not consider this flaw a security issue. This flaw can cause an OpenSSH client to crash when connecting to a malicious server, which does not result in a denial of service condition. |
|
Last major update |
17-10-2018 - 21:40 |
Published |
29-09-2006 - 00:07 |
Last modified |
17-10-2018 - 21:40 |