A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
Metrics
Affected Vendors & Products
References
History
Wed, 07 Aug 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2008-09-17T18:06:00
Updated: 2024-08-07T10:00:42.727Z
Reserved: 2008-09-16T00:00:00
Link: CVE-2008-4109
Vulnrichment
Updated: 2024-08-07T10:00:42.727Z
NVD
Status : Modified
Published: 2008-09-18T15:04:27.437
Modified: 2024-11-21T00:50:55.350
Link: CVE-2008-4109
Redhat
No data.