Vulnerability Name: | CVE-2006-0883 (CCN-25116) | ||||||||
Assigned: | 2006-03-01 | ||||||||
Published: | 2006-03-01 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
Vulnerability Type: | CWE-399 | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-06:09.openssh Remote denial of service in OpenSSH Source: FREEBSD Type: UNKNOWN FreeBSD-SA-06:09 Source: CCN Type: OpenSSH FTP Download Web page FTP page Source: CONFIRM Type: UNKNOWN http://bugzilla.mindrot.org/show_bug.cgi?id=839 Source: MITRE Type: CNA CVE-2006-0883 Source: SREASON Type: UNKNOWN 520 Source: CCN Type: SECTRACK ID: 1015706 OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service Source: SECTRACK Type: Patch 1015706 Source: OSVDB Type: UNKNOWN 23797 Source: CCN Type: OSVDB ID: 23797 OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS Source: BID Type: Patch 16892 Source: CCN Type: BID-16892 OpenSSH Remote PAM Denial Of Service Vulnerability Source: VUPEN Type: Vendor Advisory ADV-2006-0805 Source: XF Type: UNKNOWN openssh-openpam-dos(25116) Source: XF Type: UNKNOWN openssh-openpam-dos(25116) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |