Description
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1189-1 | New openssh-krb5 packages fix denial of service and potential execution of arbitrary code |
Debian DSA |
DSA-1212-1 | New openssh packages fix denial of service |
Ubuntu USN |
USN-355-1 | openssh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T19:32:22.366Z
Reserved: 2006-09-21T00:00:00.000Z
Link: CVE-2006-4924
No data.
Status : Deferred
Published: 2006-09-27T01:07:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-4924
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN