ID CVE-2004-2069
Summary sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
References
Vulnerable Configurations
  • cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
    cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
  • cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
    cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-10-2018 - 15:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2013-04-29T04:14:38.280-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
description sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
family unix
id oval:org.mitre.oval:def:11541
status accepted
submitted 2010-07-09T03:56:16-04:00
title sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
version 29
redhat via4
advisories
rhsa
id RHSA-2005:550
rpms
  • openssh-0:3.6.1p2-33.30.6
  • openssh-askpass-0:3.6.1p2-33.30.6
  • openssh-askpass-gnome-0:3.6.1p2-33.30.6
  • openssh-clients-0:3.6.1p2-33.30.6
  • openssh-debuginfo-0:3.6.1p2-33.30.6
  • openssh-server-0:3.6.1p2-33.30.6
refmap via4
bid 14963
bugtraq
  • 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
  • 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
  • 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
confirm
fedora FLSA-2006:168935
mlist
  • [openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time
  • [openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time
osvdb 16567
secunia
  • 17000
  • 17135
  • 17252
  • 22875
  • 23680
vupen ADV-2006-4502
xf openssh-sshdc-logingracetime-dos(20930)
Last major update 19-10-2018 - 15:30
Published 31-12-2004 - 05:00
Last modified 19-10-2018 - 15:30
Back to Top