ID CVE-2006-4925
Summary packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
References
Vulnerable Configurations
  • cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-10-2018 - 21:40)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bugtraq
  • 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server
  • 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server
confirm
mandriva MDKSA-2006:179
misc http://bugs.gentoo.org/show_bug.cgi?id=148228
openpkg OpenPKG-SA-2006.022
secunia
  • 22245
  • 22298
  • 22495
  • 23038
suse
  • SUSE-SA:2006:062
  • SUSE-SR:2006:024
statements via4
contributor Joshua Bressers
lastmodified 2006-10-31
organization Red Hat
statement Red Hat does not consider this flaw a security issue. This flaw can cause an OpenSSH client to crash when connecting to a malicious server, which does not result in a denial of service condition.
Last major update 17-10-2018 - 21:40
Published 29-09-2006 - 00:07
Last modified 17-10-2018 - 21:40
Back to Top