Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-5000

Опубликовано: 05 апр. 2012
Источник: debian
EPSS Низкий

Описание

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:5.9p1-1package
opensshfixed1:5.5p1-6+squeeze4squeezepackage

Примечания

  • looking at the code an additional integer overflow check was added in at least 5.9

EPSS

Процентиль: 71%
0.00698
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

redhat
больше 14 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

nvd
больше 13 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

github
больше 3 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

oracle-oval
больше 13 лет назад

ELSA-2012-0884: openssh security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 71%
0.00698
Низкий