Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9x7m-vh7w-2mvh

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

EPSS

Процентиль: 82%
0.01807
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

nvd
больше 19 лет назад

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

debian
больше 19 лет назад

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not prope ...

EPSS

Процентиль: 82%
0.01807
Низкий