[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-4925Date: (C)2006-09-28   (M)2023-12-22


packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
http://www.securityfocus.com/archive/1/archive/1/447153/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/447861/100/200/threaded
SECUNIA-22245
SECUNIA-22298
SECUNIA-22495
SECUNIA-23038
MDKSA-2006:179
OpenPKG-SA-2006.022
SUSE-SA:2006:062
SUSE-SR:2006:024
http://bugs.gentoo.org/show_bug.cgi?id=148228
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/packet.c.diff?r1=1.144&r2=1.145&f=h
https://issues.rpath.com/browse/RPL-661
https://issues.rpath.com/browse/RPL-681

CPE    1
cpe:/a:openbsd:openssh:4.5

© SecPod Technologies