CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.1%
A race condition vulnerability exists in the OpenSSH daemon. Successful exploitation of this vulnerability may result in a denial-of-service condition.
OpenSSH is an open source client and server implementation of the Secure Shell (SSH) protocol.
The OpenSSH server includes the ability to authenticate via the Generic Security Services Application Programming Interface (GSSAPI). Versions of OpenSSH prior to 4.4 contain a race condition in a signal handler during a logging operation prior to user authentication.
From the OpenSSH 4.4 release notes:
The signal handler was vulnerable to a race condition that could be exploited to perform a pre-authentication denial of service. On portable OpenSSH, this vulnerability could theoretically lead to pre-authentication remote code execution if GSSAPI authentication is enabled, but the likelihood of successful exploitation appears remote.
A remote, unauthenticated attacker may be able to cause the OpenSSH server to crash, thereby creating a denial-of-service condition
Upgrade
See the systems affected section of this document for information about specific vendors. Users who compile OpenSSH from source are encouraged to update to the most recent version.
Restrict access
Restricting access to the SSH daemon may mitigate the affects of this vulnerability. Administrators can use application-level access controls or firewall rules to restrict access to the SSH server.
Disable the OpenSSH server
If the SSH server functionality is not required, disabling it will limit exposure to this vulnerability. Refer to system-specific documentation on how to disable the OpenSSH server.
851340
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: March 13, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://docs.info.apple.com/article.html?artnum=305214> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23851340 Feedback>).
Updated: October 04, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://security.freebsd.org/advisories/FreeBSD-SA-06:22.openssh.asc> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23851340 Feedback>).
Updated: October 03, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://rhn.redhat.com/errata/RHSA-2006-0697.html> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23851340 Feedback>).
Updated: October 03, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://www.ubuntu.com/usn/usn-355-1> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23851340 Feedback>).
Updated: October 03, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://openssh.org/txt/release-4.4> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23851340 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
OpenSSH credits Mark Dowd for reporting this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-5051 |
---|---|
Severity Metric: | 1.66 Date Public: |
docs.info.apple.com/article.html?artnum=305214
openssh.org/txt/release-4.4
rhn.redhat.com/errata/RHSA-2006-0697.html
secunia.com/advisories/22173/
secunia.com/advisories/22183/
secunia.com/advisories/22208/
secunia.com/advisories/22236/
secunia.com/advisories/22362/
support.avaya.com/elmodocs2/security/ASA-2006-216.htm
tools.ietf.org/html/rfc2743
www.securityfocus.com/bid/20241
www.ubuntu.com/usn/usn-355-1
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.1%