Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-0883

Опубликовано: 07 мар. 2006
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*

EPSS

Процентиль: 82%
0.01807
Низкий

5 Medium

CVSS2

Дефекты

CWE-399

Связанные уязвимости

ubuntu
больше 19 лет назад

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

debian
больше 19 лет назад

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not prope ...

github
больше 3 лет назад

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

EPSS

Процентиль: 82%
0.01807
Низкий

5 Medium

CVSS2

Дефекты

CWE-399