Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-5000

Опубликовано: 01 авг. 2011
Источник: redhat
CVSS2: 3.5
EPSS Низкий

Описание

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4opensshWill not fix
Red Hat Enterprise Linux 5opensshWill not fix
Red Hat Enterprise Linux 6opensshFixedRHSA-2012:088419.06.2012

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=809938openssh: post-authentication resource exhaustion bug via GSSAPI

EPSS

Процентиль: 71%
0.00698
Низкий

3.5 Low

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

nvd
больше 13 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

debian
больше 13 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and e ...

github
больше 3 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

oracle-oval
больше 13 лет назад

ELSA-2012-0884: openssh security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 71%
0.00698
Низкий

3.5 Low

CVSS2

Уязвимость CVE-2011-5000