Revision Date: | 2013-04-29 | Version: | 11 | Title: | sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector. | Description: | sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2006-4924
| Platform(s): | CentOS Linux 3 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4
| Product(s): | | Definition Synopsis | OS Section: RHEL3, CentOS3 RHEL3 or CentOS3
The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND Configuration section
openssh is earlier than 0:3.6.1p2-33.30.12
OR openssh-askpass is earlier than 0:3.6.1p2-33.30.12
OR openssh-server is earlier than 0:3.6.1p2-33.30.12
OR openssh-clients is earlier than 0:3.6.1p2-33.30.12
OR openssh-askpass-gnome is earlier than 0:3.6.1p2-33.30.12
OR OS Section: RHEL4, CentOS4, Oracle Linux 4
RHEL4, CentOS4 or Oracle Linux 4
The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
openssh is earlier than 0:3.9p1-8.RHEL4.17
OR openssh-askpass is earlier than 0:3.9p1-8.RHEL4.17
OR openssh-server is earlier than 0:3.9p1-8.RHEL4.17
OR openssh-clients is earlier than 0:3.9p1-8.RHEL4.17
OR openssh-askpass-gnome is earlier than 0:3.9p1-8.RHEL4.17
|
|