Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3521

Опубликовано: 24 фев. 2016
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2016-3521: openssh security update (IMPORTANT)

[4.3p2-82.0.1]

  • change default value of MaxStartups - CVE-2010-5107 (John Haxby) [orabug 22766491]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

openssh

4.3p2-82.0.1.el5

openssh-askpass

4.3p2-82.0.1.el5

openssh-clients

4.3p2-82.0.1.el5

openssh-server

4.3p2-82.0.1.el5

Oracle Linux x86_64

openssh

4.3p2-82.0.1.el5

openssh-askpass

4.3p2-82.0.1.el5

openssh-clients

4.3p2-82.0.1.el5

openssh-server

4.3p2-82.0.1.el5

Oracle Linux i386

openssh

4.3p2-82.0.1.el5

openssh-askpass

4.3p2-82.0.1.el5

openssh-clients

4.3p2-82.0.1.el5

openssh-server

4.3p2-82.0.1.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

redhat
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

nvd
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

debian
больше 12 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time ...

github
около 3 лет назад

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.