Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-5107

Опубликовано: 07 мар. 2013
Источник: debian
EPSS Низкий

Описание

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:6.0p1-4package
opensshfixed1:5.5p1-6+squeeze3squeezepackage

EPSS

Процентиль: 82%
0.01794
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

redhat
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

nvd
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

github
около 3 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

oracle-oval
больше 9 лет назад

ELSA-2016-3521: openssh security update (IMPORTANT)

EPSS

Процентиль: 82%
0.01794
Низкий