[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-4109Date: (C)2008-09-18   (M)2024-02-09


A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECTRACK-1020891
SECUNIA-31885
SECUNIA-32080
SECUNIA-32181
DSA-1638
SUSE-SR:2008:020
USN-649-1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498678
openssh-signalhandler-dos(45202)

CPE    67
cpe:/a:openbsd:openssh:1.2.3
cpe:/a:openbsd:openssh:1.2.2
cpe:/a:openbsd:openssh:1.2.1
cpe:/a:openbsd:openssh:3.7.1p2
...
CWE    1
CWE-264
OVAL    1
oval:org.mitre.oval:def:8085

© SecPod Technologies