CVE-2006-0883

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*

Information

Published : 2006-03-06 18:02

Updated : 2017-07-19 18:30


NVD link : CVE-2006-0883

Mitre link : CVE-2006-0883


JSON object : View

CWE
CWE-399

Resource Management Errors

Advertisement

dedicated server usa

Products Affected

openbsd

  • openssh

freebsd

  • freebsd