Lucene search

K
cve[email protected]CVE-2010-4755
HistoryMar 02, 2011 - 8:00 p.m.

CVE-2010-4755

2011-03-0220:00:00
CWE-399
web.nvd.nist.gov
1412
cve-2010-4755
openssh 5.8
remote authenticated users
denial of service
cpu and memory consumption
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

5 Medium

AI Score

Confidence

High

0.323 Low

EPSS

Percentile

97.0%

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.

Affected configurations

NVD
Node
openbsdopensshRange5.8
OR
openbsdopensshMatch1.2
OR
openbsdopensshMatch1.2.1
OR
openbsdopensshMatch1.2.2
OR
openbsdopensshMatch1.2.3
OR
openbsdopensshMatch1.2.27
OR
openbsdopensshMatch1.3
OR
openbsdopensshMatch1.5
OR
openbsdopensshMatch1.5.7
OR
openbsdopensshMatch1.5.8
OR
openbsdopensshMatch2.1
OR
openbsdopensshMatch2.1.1
OR
openbsdopensshMatch2.2
OR
openbsdopensshMatch2.3
OR
openbsdopensshMatch2.3.1
OR
openbsdopensshMatch2.5
OR
openbsdopensshMatch2.5.1
OR
openbsdopensshMatch2.5.2
OR
openbsdopensshMatch2.9
OR
openbsdopensshMatch2.9.9
OR
openbsdopensshMatch2.9.9p2
OR
openbsdopensshMatch2.9p1
OR
openbsdopensshMatch2.9p2
OR
openbsdopensshMatch3.0
OR
openbsdopensshMatch3.0.1
OR
openbsdopensshMatch3.0.1p1
OR
openbsdopensshMatch3.0.2
OR
openbsdopensshMatch3.0.2p1
OR
openbsdopensshMatch3.0p1
OR
openbsdopensshMatch3.1
OR
openbsdopensshMatch3.1p1
OR
openbsdopensshMatch3.2
OR
openbsdopensshMatch3.2.2
OR
openbsdopensshMatch3.2.2p1
OR
openbsdopensshMatch3.2.3p1
OR
openbsdopensshMatch3.3
OR
openbsdopensshMatch3.3p1
OR
openbsdopensshMatch3.4
OR
openbsdopensshMatch3.4p1
OR
openbsdopensshMatch3.5
OR
openbsdopensshMatch3.5p1
OR
openbsdopensshMatch3.6
OR
openbsdopensshMatch3.6.1
OR
openbsdopensshMatch3.6.1p1
OR
openbsdopensshMatch3.6.1p2
OR
openbsdopensshMatch3.7
OR
openbsdopensshMatch3.7.1
OR
openbsdopensshMatch3.7.1p1
OR
openbsdopensshMatch3.7.1p2
OR
openbsdopensshMatch3.8
OR
openbsdopensshMatch3.8.1
OR
openbsdopensshMatch3.8.1p1
OR
openbsdopensshMatch3.9
OR
openbsdopensshMatch3.9.1
OR
openbsdopensshMatch3.9.1p1
OR
openbsdopensshMatch4.0
OR
openbsdopensshMatch4.0p1
OR
openbsdopensshMatch4.1
OR
openbsdopensshMatch4.1p1
OR
openbsdopensshMatch4.2
OR
openbsdopensshMatch4.2p1
OR
openbsdopensshMatch4.3
OR
openbsdopensshMatch4.3p1
OR
openbsdopensshMatch4.3p2
OR
openbsdopensshMatch4.4
OR
openbsdopensshMatch4.4p1
OR
openbsdopensshMatch4.5
OR
openbsdopensshMatch4.6
OR
openbsdopensshMatch4.7
OR
openbsdopensshMatch4.7p1
OR
openbsdopensshMatch4.8
OR
openbsdopensshMatch4.9
OR
openbsdopensshMatch5.0
OR
openbsdopensshMatch5.1
OR
openbsdopensshMatch5.2
OR
openbsdopensshMatch5.3
OR
openbsdopensshMatch5.4
OR
openbsdopensshMatch5.5
OR
openbsdopensshMatch5.6
OR
openbsdopensshMatch5.7
AND
freebsdfreebsdMatch7.3
OR
freebsdfreebsdMatch8.1
OR
netbsdnetbsdMatch5.0.2
OR
openbsdopenbsdMatch4.7

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

5 Medium

AI Score

Confidence

High

0.323 Low

EPSS

Percentile

97.0%