Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955", "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955", "tags": ["Patch", "Vendor Advisory"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/20216", "name": "20216", "tags": ["Exploit", "Patch"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/22091", "name": "22091", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://bugs.gentoo.org/show_bug.cgi?id=148228", "name": "http://bugs.gentoo.org/show_bug.cgi?id=148228", "tags": [], "refsource": "CONFIRM"}, {"url": "http://security.gentoo.org/glsa/glsa-200609-17.xml", "name": "GLSA-200609-17", "tags": [], "refsource": "GENTOO"}, {"url": "http://securitytracker.com/id?1016931", "name": "1016931", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/21923", "name": "21923", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22164", "name": "22164", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc", "name": "FreeBSD-SA-06:22.openssh", "tags": [], "refsource": "FREEBSD"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0698.html", "name": "RHSA-2006:0698", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0697.html", "name": "RHSA-2006:0697", "tags": [], "refsource": "REDHAT"}, {"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566", "name": "SSA:2006-272-02", "tags": [], "refsource": "SLACKWARE"}, {"url": "http://www.ubuntu.com/usn/usn-355-1", "name": "USN-355-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://secunia.com/advisories/22158", "name": "22158", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22183", "name": "22183", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22196", "name": "22196", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22236", "name": "22236", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2006/dsa-1189", "name": "DSA-1189", "tags": ["Patch"], "refsource": "DEBIAN"}, {"url": "http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc", "name": "FreeBSD-SA-06:22", "tags": [], "refsource": "FREEBSD"}, {"url": "http://www.trustix.org/errata/2006/0054", "name": "2006-0054", "tags": [], "refsource": "TRUSTIX"}, {"url": "http://www.kb.cert.org/vuls/id/787448", "name": "VU#787448", "tags": ["US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://www.osvdb.org/29152", "name": "29152", "tags": [], "refsource": "OSVDB"}, {"url": "http://secunia.com/advisories/22270", "name": "22270", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22116", "name": "22116", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22208", "name": "22208", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22245", "name": "22245", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.openbsd.org/errata.html#ssh", "name": "[2.9] 015: SECURITY FIX: October 12, 2006", "tags": [], "refsource": "OPENBSD"}, {"url": "http://www.novell.com/linux/security/advisories/2006_24_sr.html", "name": "SUSE-SR:2006:024", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/22352", "name": "22352", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html", "name": "OpenPKG-SA-2006.022", "tags": [], "refsource": "OPENPKG"}, {"url": "http://secunia.com/advisories/22362", "name": "22362", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.novell.com/linux/security/advisories/2006_62_openssh.html", "name": "SUSE-SA:2006:062", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/22495", "name": "22495", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc", "name": "20061001-01-P", "tags": [], "refsource": "SGI"}, {"url": "http://secunia.com/advisories/22487", "name": "22487", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227", "name": "http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227", "tags": [], "refsource": "CONFIRM"}, {"url": "http://security.gentoo.org/glsa/glsa-200611-06.xml", "name": "GLSA-200611-06", "tags": [], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/22823", "name": "22823", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2006/dsa-1212", "name": "DSA-1212", "tags": ["Patch"], "refsource": "DEBIAN"}, {"url": "http://secunia.com/advisories/22926", "name": "22926", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/23038", "name": "23038", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/23241", "name": "23241", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22298", "name": "22298", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/23340", "name": "23340", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/23680", "name": "23680", "tags": [], "refsource": "SECUNIA"}, {"url": "https://issues.rpath.com/browse/RPL-661", "name": "https://issues.rpath.com/browse/RPL-661", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/24479", "name": "24479", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html", "name": "[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability", "tags": [], "refsource": "MLIST"}, {"url": "http://secunia.com/advisories/24805", "name": "24805", "tags": [], "refsource": "SECUNIA"}, {"url": "http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability", "name": "http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability", "tags": [], "refsource": "CONFIRM"}, {"url": "http://sourceforge.net/forum/forum.php?forum_id=681763", "name": "http://sourceforge.net/forum/forum.php?forum_id=681763", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html", "name": "APPLE-SA-2007-03-13", "tags": [], "refsource": "APPLE"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:179", "name": "MDKSA-2006:179", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1", "name": "102962", "tags": [], "refsource": "SUNALERT"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html", "name": "TA07-072A", "tags": ["US Government Resource"], "refsource": "CERT"}, {"url": "http://secunia.com/advisories/25608", "name": "25608", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/24799", "name": "24799", "tags": [], "refsource": "SECUNIA"}, {"url": "ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt", "name": "SCOSA-2008.2", "tags": [], "refsource": "SCO"}, {"url": "http://secunia.com/advisories/29371", "name": "29371", "tags": [], "refsource": "SECUNIA"}, {"url": "https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg", "name": "https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vupen.com/english/advisories/2009/0740", "name": "ADV-2009-0740", "tags": [], "refsource": "VUPEN"}, {"url": "http://secunia.com/advisories/34274", "name": "34274", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2007/0930", "name": "ADV-2007-0930", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2007/1332", "name": "ADV-2007-1332", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/4869", "name": "ADV-2006-4869", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/3777", "name": "ADV-2006-3777", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2007/2119", "name": "ADV-2007-2119", "tags": [], "refsource": "VUPEN"}, {"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112", "name": "HPSBUX02178", "tags": [], "refsource": "HP"}, {"url": "http://www.vupen.com/english/advisories/2006/4401", "name": "ADV-2006-4401", "tags": [], "refsource": "VUPEN"}, {"url": "http://docs.info.apple.com/article.html?artnum=305214", "name": "http://docs.info.apple.com/article.html?artnum=305214", "tags": [], "refsource": "CONFIRM"}, {"url": "http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2", "name": "[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released", "tags": [], "refsource": "MLIST"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29158", "name": "openssh-block-dos(29158)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193", "name": "oval:org.mitre.oval:def:1193", "tags": [], "refsource": "OVAL"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462", "name": "oval:org.mitre.oval:def:10462", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/447153/100/0/threaded", "name": "20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-399"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-4924", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "severity": "HIGH", "impactScore": 6.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-09-27T01:07Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-17T21:40Z"}