Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-5000

Опубликовано: 05 апр. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.5

Описание

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

РелизСтатусПримечание
devel

not-affected

1:5.9p1-5ubuntu1
esm-infra-legacy/trusty

not-affected

1:5.9p1-5ubuntu1
hardy

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

not-affected

1:5.9p1-5ubuntu1
quantal

not-affected

1:5.9p1-5ubuntu1
raring

not-affected

1:5.9p1-5ubuntu1

Показывать по

EPSS

Процентиль: 59%
0.00379
Низкий

3.5 Low

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

nvd
около 14 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

debian
около 14 лет назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and e ...

github
почти 4 года назад

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

oracle-oval
почти 14 лет назад

ELSA-2012-0884: openssh security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 59%
0.00379
Низкий

3.5 Low

CVSS2