[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-0883Date: (C)2006-03-06   (M)2023-12-22


OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECTRACK-1015706
BID-16892
OSVDB-23797
SREASON-520
ADV-2006-0805
FreeBSD-SA-06:09
http://bugzilla.mindrot.org/show_bug.cgi?id=839
openssh-openpam-dos(25116)

CPE    2
cpe:/o:freebsd:freebsd:5.3
cpe:/a:openbsd:openssh:3.8.1p1
CWE    1
CWE-399

© SecPod Technologies