Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w6q4-qg4h-298g

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

EPSS

Процентиль: 74%
0.00882
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

redhat
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

nvd
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

debian
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time ...

oracle-oval
больше 9 лет назад

ELSA-2016-3521: openssh security update (IMPORTANT)

EPSS

Процентиль: 74%
0.00882
Низкий