Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-4924

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-27 Sep, 2006 | 01:00
Updated At-07 Aug, 2024 | 19:32
Rejected At-
Credits

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:27 Sep, 2006 | 01:00
Updated At:07 Aug, 2024 | 19:32
Rejected At:
▼CVE Numbering Authority (CNA)

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
http://sourceforge.net/forum/forum.php?forum_id=681763
x_refsource_CONFIRM
http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
x_refsource_CONFIRM
http://secunia.com/advisories/22270
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-355-1
vendor-advisory
x_refsource_UBUNTU
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/0740
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/21923
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24805
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
http://www.openbsd.org/errata.html#ssh
vendor-advisory
x_refsource_OPENBSD
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200611-06.xml
vendor-advisory
x_refsource_GENTOO
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
x_refsource_CONFIRM
http://bugs.gentoo.org/show_bug.cgi?id=148228
x_refsource_CONFIRM
http://secunia.com/advisories/22164
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
vendor-advisory
x_refsource_SUNALERT
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22362
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/34274
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/787448
third-party-advisory
x_refsource_CERT-VN
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
http://securitytracker.com/id?1016931
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4869
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22352
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22236
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/24799
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
x_refsource_MISC
http://secunia.com/advisories/22091
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22495
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1332
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/20216
vdb-entry
x_refsource_BID
http://www.securityfocus.com/archive/1/447153/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-200609-17.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/22823
third-party-advisory
x_refsource_SECUNIA
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
vendor-advisory
x_refsource_SLACKWARE
http://www.redhat.com/support/errata/RHSA-2006-0697.html
vendor-advisory
x_refsource_REDHAT
https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3777
vdb-entry
x_refsource_VUPEN
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
vendor-advisory
x_refsource_OPENPKG
http://secunia.com/advisories/22183
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
vdb-entry
x_refsource_XF
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/23241
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2119
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/22926
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29371
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22208
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/22245
third-party-advisory
x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
https://issues.rpath.com/browse/RPL-661
x_refsource_CONFIRM
http://secunia.com/advisories/22196
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1212
vendor-advisory
x_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
vdb-entry
signature
x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2006-0698.html
vendor-advisory
x_refsource_REDHAT
http://www.osvdb.org/29152
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/25608
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22158
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
vendor-advisory
x_refsource_MANDRIVA
http://www.debian.org/security/2006/dsa-1189
vendor-advisory
x_refsource_DEBIAN
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
x_refsource_CONFIRM
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
vendor-advisory
x_refsource_SCO
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://sourceforge.net/forum/forum.php?forum_id=681763
Resource:
x_refsource_CONFIRM
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22270
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-355-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2009/0740
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/21923
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24805
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.openbsd.org/errata.html#ssh
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=148228
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22164
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.novell.com/linux/security/advisories/2006_62_openssh.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22362
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/34274
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/787448
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
Hyperlink: http://securitytracker.com/id?1016931
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22352
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22236
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/24799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/22091
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22495
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1332
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/20216
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/archive/1/447153/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/22823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0697.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/3777
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://secunia.com/advisories/22183
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/23241
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/2119
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/22926
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29371
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22208
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22245
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: https://issues.rpath.com/browse/RPL-661
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22196
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1212
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.osvdb.org/29152
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/25608
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22158
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.debian.org/security/2006/dsa-1189
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
Resource:
x_refsource_CONFIRM
Hyperlink: ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
Resource:
vendor-advisory
x_refsource_SCO
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://sourceforge.net/forum/forum.php?forum_id=681763
x_refsource_CONFIRM
x_transferred
http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22270
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-355-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2009/0740
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/21923
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24805
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.openbsd.org/errata.html#ssh
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://security.gentoo.org/glsa/glsa-200611-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
x_refsource_CONFIRM
x_transferred
http://bugs.gentoo.org/show_bug.cgi?id=148228
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22164
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22362
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/34274
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/787448
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
x_transferred
http://securitytracker.com/id?1016931
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2006/4869
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22352
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22236
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/24799
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
x_refsource_MISC
x_transferred
http://secunia.com/advisories/22091
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22495
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1332
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/20216
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/archive/1/447153/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://security.gentoo.org/glsa/glsa-200609-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/22823
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0697.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/3777
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://secunia.com/advisories/22183
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
vdb-entry
x_refsource_XF
x_transferred
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/23241
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/2119
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
x_transferred
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/22926
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29371
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22208
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22245
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
https://issues.rpath.com/browse/RPL-661
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22196
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1212
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0698.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.osvdb.org/29152
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/25608
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22158
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.debian.org/security/2006/dsa-1189
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
x_refsource_CONFIRM
x_transferred
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
vendor-advisory
x_refsource_SCO
x_transferred
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://sourceforge.net/forum/forum.php?forum_id=681763
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22270
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-355-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0740
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/21923
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24805
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.openbsd.org/errata.html#ssh
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=148228
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22164
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_62_openssh.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22362
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/34274
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/787448
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://securitytracker.com/id?1016931
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22352
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22236
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/24799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/22091
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22495
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1332
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20216
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/447153/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/22823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0697.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3777
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://secunia.com/advisories/22183
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/23241
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2119
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/22926
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29371
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22208
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22245
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-661
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22196
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1212
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.osvdb.org/29152
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/25608
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22158
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1189
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
Resource:
vendor-advisory
x_refsource_SCO
x_transferred
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:27 Sep, 2006 | 01:07
Updated At:17 Oct, 2018 | 21:40

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

OpenBSD
openbsd
>>openssh>>1.2
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.1
cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.2
cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.3
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.27
cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.1
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.1.1
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.2
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.3
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.5
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.5.1
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.5.2
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9.9
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9.9p2
cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9p1
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9p2
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1p1
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2p1
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0p1
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1p1
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.2
cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.2p1
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.3p1
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3p1
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4p1
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5p1
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p1
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p2
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1p1
cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1p2
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1p1
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1p1
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.0
cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.ascsecalert@redhat.com
N/A
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txtsecalert@redhat.com
N/A
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.ascsecalert@redhat.com
N/A
http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerabilitysecalert@redhat.com
N/A
http://bugs.gentoo.org/show_bug.cgi?id=148228secalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=305214secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlsecalert@redhat.com
N/A
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2secalert@redhat.com
N/A
http://secunia.com/advisories/21923secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22091secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22116secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22158secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22164secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22183secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22196secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22208secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22236secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22245secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22270secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22298secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22352secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22362secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22487secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22495secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22823secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22926secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23038secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23241secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23340secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23680secalert@redhat.com
N/A
http://secunia.com/advisories/24479secalert@redhat.com
N/A
http://secunia.com/advisories/24799secalert@redhat.com
N/A
http://secunia.com/advisories/24805secalert@redhat.com
N/A
http://secunia.com/advisories/25608secalert@redhat.com
N/A
http://secunia.com/advisories/29371secalert@redhat.com
N/A
http://secunia.com/advisories/34274secalert@redhat.com
N/A
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.ascsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200609-17.xmlsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200611-06.xmlsecalert@redhat.com
N/A
http://securitytracker.com/id?1016931secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566secalert@redhat.com
N/A
http://sourceforge.net/forum/forum.php?forum_id=681763secalert@redhat.com
N/A
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htmsecalert@redhat.com
N/A
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.htmlsecalert@redhat.com
N/A
http://www.debian.org/security/2006/dsa-1189secalert@redhat.com
Patch
http://www.debian.org/security/2006/dsa-1212secalert@redhat.com
Patch
http://www.kb.cert.org/vuls/id/787448secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_24_sr.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_62_openssh.htmlsecalert@redhat.com
N/A
http://www.openbsd.org/errata.html#sshsecalert@redhat.com
N/A
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/29152secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0697.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0698.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/447153/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/20216secalert@redhat.com
Exploit
Patch
http://www.trustix.org/errata/2006/0054secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-355-1secalert@redhat.com
N/A
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlsecalert@redhat.com
US Government Resource
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlsecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3777secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4401secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4869secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0930secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1332secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2119secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2009/0740secalert@redhat.com
N/A
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955secalert@redhat.com
Patch
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29158secalert@redhat.com
N/A
https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sgsecalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-661secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193secalert@redhat.com
N/A
Hyperlink: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=148228
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21923
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22091
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22116
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22158
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22164
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22183
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22196
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22208
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22236
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22245
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22270
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22298
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22352
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22362
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22487
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22495
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22823
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22926
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23038
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23241
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23340
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23680
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24479
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24799
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24805
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25608
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29371
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/34274
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-17.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-06.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016931
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sourceforge.net/forum/forum.php?forum_id=681763
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2006/dsa-1189
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.debian.org/security/2006/dsa-1212
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.kb.cert.org/vuls/id/787448
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_62_openssh.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openbsd.org/errata.html#ssh
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/29152
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0697.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/447153/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/20216
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: http://www.trustix.org/errata/2006/0054
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-355-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3777
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1332
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2119
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0740
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-661
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

135Records found

CVE-2009-0687
Matching Score-10
Assigner-CERT/CC
ShareView Details
Matching Score-10
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-12.33% / 93.62%
||
7 Day CHG~0.00%
Published-11 Aug, 2009 | 10:00
Updated-07 Aug, 2024 | 04:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

Action-Not Available
Vendor-mirbsdmidnightbsdn/aOpenBSDNetBSD
Product-openbsdnetbsdmidnightbsdmirosn/a
CWE ID-CWE-399
Not Available
CVE-2017-5850
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-49.59% / 97.72%
||
7 Day CHG~0.00%
Published-27 Mar, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2011-3336
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-23.65% / 95.77%
||
7 Day CHG~0.00%
Published-12 Feb, 2020 | 19:32
Updated-06 Aug, 2024 | 23:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.

Action-Not Available
Vendor-The PHP GroupApple Inc.FreeBSD FoundationOpenBSD
Product-openbsdfreebsdphpmac_os_xmacOS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2008-1058
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.32% / 54.45%
||
7 Day CHG~0.00%
Published-28 Feb, 2008 | 19:00
Updated-07 Aug, 2024 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2016-8858
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-64.72% / 98.39%
||
7 Day CHG~0.00%
Published-09 Dec, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."

Action-Not Available
Vendor-n/aOpenBSD
Product-opensshn/a
CVE-2016-6515
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-82.90% / 99.20%
||
7 Day CHG~0.00%
Published-07 Aug, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.

Action-Not Available
Vendor-n/aOpenBSDFedora Project
Product-fedoraopensshn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6244
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.05% / 76.66%
||
7 Day CHG~0.00%
Published-07 Mar, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sys_thrsigdivert function in kern/kern_sig.c in the OpenBSD kernel 5.9 allows remote attackers to cause a denial of service (panic) via a negative "ts.tv_sec" value.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1057
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.39% / 59.44%
||
7 Day CHG~0.00%
Published-28 Feb, 2008 | 19:00
Updated-07 Aug, 2024 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ip6_check_rh0hdr function in netinet6/ip6_input.c in OpenBSD 4.2 allows attackers to cause a denial of service (panic) via malformed IPv6 routing headers.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2007-2242
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-32.57% / 96.70%
||
7 Day CHG~0.00%
Published-25 Apr, 2007 | 16:00
Updated-07 Aug, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.

Action-Not Available
Vendor-n/aNetBSDThe IETF Administration LLC (IETF LLC)OpenBSDFreeBSD Foundation
Product-openbsdipv6freebsdnetbsdn/a
CVE-2008-3831
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.09% / 26.62%
||
7 Day CHG~0.00%
Published-20 Oct, 2008 | 17:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The i915 driver in (1) drivers/char/drm/i915_dma.c in the Linux kernel 2.6.24 on Debian GNU/Linux and (2) sys/dev/pci/drm/i915_drv.c in OpenBSD does not restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager (DRM) master, which allows local users to cause a denial of service (memory corruption) via a crafted ioctl call, related to absence of the DRM_MASTER and DRM_ROOT_ONLY flags in the ioctl's configuration.

Action-Not Available
Vendor-n/aDebian GNU/LinuxOpenBSDLinux Kernel Organization, Inc
Product-linux_kernellinuxn/a
CWE ID-CWE-399
Not Available
CVE-2007-4654
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.68% / 70.56%
||
7 Day CHG~0.00%
Published-04 Sep, 2007 | 22:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via a series of large packets designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144), possibly a related issue to CVE-2002-1024.

Action-Not Available
Vendor-teamf1n/aOpenBSDCisco Systems, Inc.
Product-sshieldcontent_services_switch_11000opensshwebnsn/a
CWE ID-CWE-399
Not Available
CVE-2007-0772
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-2.67% / 85.21%
||
7 Day CHG~0.00%
Published-20 Feb, 2007 | 17:00
Updated-07 Aug, 2024 | 12:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel 2.6.13 and other versions before 2.6.20.1 allows remote attackers to cause a denial of service (oops) via a crafted NFSACL 2 ACCESS request that triggers a free of an incorrect pointer.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-399
Not Available
CVE-2017-6630
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.68% / 70.55%
||
7 Day CHG~0.00%
Published-22 May, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Session Initiation Protocol (SIP) implementation of Cisco IP Phone 8851 11.0(0.1) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to an abnormal SIP message. An attacker could exploit this vulnerability by manipulating the CANCEL packet. An exploit could allow the attacker to cause a disruption of service to the phone. Cisco Bug IDs: CSCvc34795.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ip_phone_8851ip_phone_8800_series_firmwareCisco IP Phone 8851
CWE ID-CWE-399
Not Available
CVE-2017-6608
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.42% / 61.34%
||
7 Day CHG~0.00%
Published-20 Apr, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system. The vulnerability is due to improper parsing of crafted SSL or TLS packets. An attacker could exploit this vulnerability by sending a crafted packet to the affected system. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is needed to exploit this vulnerability. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 8.4(7.31) 9.0(4.39) 9.1(7) 9.2(4.6) 9.3(3.8) 9.4(2) 9.5(2). Cisco Bug IDs: CSCuv48243.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwareCisco ASA Software
CWE ID-CWE-399
Not Available
CVE-2017-6678
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.48% / 64.31%
||
7 Day CHG~0.00%
Published-26 Jun, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the ingress UDP packet processing functionality of Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software 19.2 through 21.0 could allow an unauthenticated, remote attacker to cause both control function (CF) instances on an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient handling of user-supplied data by the affected software. An attacker could exploit this vulnerability by sending crafted UDP packets to the distributed instance (DI) network addresses of both CF instances on an affected system. A successful exploit could allow the attacker to cause an unhandled error condition on the affected system, which would cause the CF instances to reload and consequently cause the entire VPC to reload, resulting in the disconnection of all subscribers and a DoS condition on the affected system. This vulnerability can be exploited via IPv4 traffic only. Cisco Bug IDs: CSCvc01665 CSCvc35565.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-virtualized_packet_coreCisco Virtualized Packet Core-Distributed Instance
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CWE ID-CWE-399
Not Available
CVE-2017-6632
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.36% / 79.35%
||
7 Day CHG~0.00%
Published-22 May, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the logging configuration of Secure Sockets Layer (SSL) policies for Cisco FirePOWER System Software 5.3.0 through 6.2.2 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources. The vulnerability is due to the logging of certain TCP packets by the affected software. An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device. A successful exploit could allow the attacker to cause a DoS condition. The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device. This vulnerability affects Cisco FirePOWER System Software that is configured to log connections by using SSL policy default actions. Cisco Bug IDs: CSCvd07072.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firepower_threat_defenseCisco FirePOWER System Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-399
Not Available
CVE-2017-6780
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.48% / 64.31%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the TCP throttling process for Cisco IoT Field Network Director (IoT-FND) could allow an unauthenticated, remote attacker to cause the system to consume additional memory, eventually forcing the device to restart, aka Memory Exhaustion. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP packets to a specific group of open listening ports on a targeted device. An exploit could allow the attacker to cause the system to consume additional memory. If enough available memory is consumed, the system will restart, creating a temporary denial of service (DoS) condition. The DoS condition will end after the device has finished the restart process. This vulnerability affects the following Cisco products: Connected Grid Network Management System, if running a software release prior to IoT-FND Release 4.0; IoT Field Network Director, if running a software release prior to IoT-FND Release 4.0. Cisco Bug IDs: CSCvc77164.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iot_field_network_directorconnected_grid_network_management_systemCisco IoT Field Network Director
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CWE ID-CWE-399
Not Available
CVE-2017-6648
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.73% / 71.85%
||
7 Day CHG~0.00%
Published-08 Jun, 2017 | 13:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_tc_softwaretelepresence_ce_softwareCisco TelePresence Endpoint Denial of Service Vulnerability
CWE ID-CWE-399
Not Available
CVE-2017-6631
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.48% / 64.31%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the HTTP remote procedure call (RPC) service of set-top box (STB) receivers manufactured by Cisco for Yes could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the firmware of an affected device fails to handle certain XML values that are passed to the HTTP RPC service listening on the local subnet of the device. An attacker could exploit this vulnerability by submitting a malformed request to an affected device. A successful attack could cause the affected device to restart, resulting in a DoS condition. Yes has updated the affected devices with firmware that addresses this vulnerability. Customers are not required to take action. Vulnerable Products: This vulnerability affects YesMaxTotal, YesMax HD, and YesQuattro STB devices. Cisco Bug IDs: CSCvd08812.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-yesmax_hd_firmwareyesmax_hdyesmaxtotal_firmwareyesmaxtotalyesquattro_firmwareyesquattroCisco Yes Set-Top Box
CWE ID-CWE-399
Not Available
CVE-2017-3857
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.14% / 77.54%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Layer 2 Tunneling Protocol (L2TP) parsing function of Cisco IOS (12.0 through 12.4 and 15.0 through 15.6) and Cisco IOS XE (3.1 through 3.18) could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of L2TP packets. An attacker could exploit this vulnerability by sending a crafted L2TP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or Cisco IOS XE Software if the L2TP feature is enabled for the device and the device is configured as an L2TP Version 2 (L2TPv2) or L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not enabled. Cisco Bug IDs: CSCuy82078.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-399
Not Available
CVE-2017-3864
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.12% / 77.38%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the DHCP client implementation of Cisco IOS (12.2, 12.4, and 15.0 through 15.6) and Cisco IOS XE (3.3 through 3.7) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability occurs during the parsing of a crafted DHCP packet. An attacker could exploit this vulnerability by sending crafted DHCP packets to an affected device that is configured as a DHCP client. A successful exploit could allow the attacker to cause a reload of an affected device, resulting in a DoS condition. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or IOS XE Software and using a specific DHCP client configuration. Cisco Bug IDs: CSCuu43892.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-399
Not Available
CVE-2006-6723
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-53.46% / 97.89%
||
7 Day CHG~0.00%
Published-26 Dec, 2006 | 20:00
Updated-07 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Workstation service in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to cause a denial of service (memory consumption) via a large maxlen value in an NetrWkstaUserEnum RPC request.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_xpwindows_2000n/a
CWE ID-CWE-399
Not Available
CVE-2006-4517
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.99% / 82.87%
||
7 Day CHG~0.00%
Published-01 Nov, 2006 | 15:00
Updated-07 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Novell iManager 2.5 and 2.0.2 allows remote attackers to cause a denial of service (crash) in the Tomcat server via a long TREE parameter in an HTTP POST, which triggers a NULL pointer dereference.

Action-Not Available
Vendor-n/aNovell
Product-imanagern/a
CWE ID-CWE-189
Not Available
CWE ID-CWE-399
Not Available
CVE-2006-2940
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-17.76% / 94.86%
||
7 Day CHG~0.00%
Published-28 Sep, 2006 | 18:00
Updated-07 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-399
Not Available
CVE-2006-2937
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-6.37% / 90.61%
||
7 Day CHG~0.00%
Published-28 Sep, 2006 | 18:00
Updated-07 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-399
Not Available
CVE-2009-2815
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.55% / 66.87%
||
7 Day CHG~0.00%
Published-10 Sep, 2009 | 21:00
Updated-16 Sep, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Telephony component in Apple iPhone OS before 3.1 does not properly handle SMS arrival notifications, which allows remote attackers to cause a denial of service (NULL pointer dereference and service interruption) via a crafted SMS message.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osn/a
CWE ID-CWE-399
Not Available
CVE-2008-1364
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.80% / 82.03%
||
7 Day CHG~0.00%
Published-20 Mar, 2008 | 00:00
Updated-07 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the DHCP service in VMware Workstation 5.5.x before 5.5.6, VMware Player 1.0.x before 1.0.6, VMware ACE 1.0.x before 1.0.5, VMware Server 1.0.x before 1.0.5, and VMware Fusion 1.1.x before 1.1.1 allows attackers to cause a denial of service.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstationvmware_workstationacevmware_serverserverplayern/a
CWE ID-CWE-399
Not Available
CVE-2010-0317
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-8.96% / 92.25%
||
7 Day CHG~0.00%
Published-15 Jan, 2010 | 18:00
Updated-07 Aug, 2024 | 00:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Novell Netware 6.5 SP8 allows remote attackers to cause a denial of service (NULL pointer dereference, memory consumption, ABEND, and crash) via a large number of malformed or AFP requests that are not properly handled by (1) the CIFS functionality in CIFS.nlm Semantic Agent (Build 163 MP) 3.27 or (2) the AFP functionality in AFPTCP.nlm Build 163 SP 3.27. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aNovell
Product-netwaren/a
CWE ID-CWE-399
Not Available
CVE-2009-3613
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-5.54% / 89.89%
||
7 Day CHG~0.00%
Published-19 Oct, 2009 | 19:27
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-399
Not Available
CVE-2009-3726
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-5.82% / 90.17%
||
7 Day CHG~0.00%
Published-09 Nov, 2009 | 19:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-399
Not Available
CVE-2009-3899
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.27% / 83.98%
||
7 Day CHG~0.00%
Published-06 Nov, 2009 | 15:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the Sockets Direct Protocol (SDP) driver in Sun Solaris 10, and OpenSolaris snv_57 through snv_94, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-opensolarissolarisn/a
CWE ID-CWE-399
Not Available
CVE-2009-4479
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.69% / 70.91%
||
7 Day CHG~0.00%
Published-30 Dec, 2009 | 21:00
Updated-16 Sep, 2024 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LDAP3A.exe in MailSite 8.0.4 allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 7.13 through 8.11. NOTE: as of 20091229, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-mailsiten/a
Product-mailsiten/a
CWE ID-CWE-399
Not Available
CVE-2017-12219
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.38% / 79.49%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the handling of IP fragments for the Cisco Small Business SPA300, SPA500, and SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to the inability to handle many large IP fragments for reassembly in a short duration. An attacker could exploit this vulnerability by sending a crafted stream of IP fragments to the targeted device. An exploit could allow the attacker to cause a DoS condition when the device unexpectedly reloads. Cisco Bug IDs: CSCve82586.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-spa_514gspa_502g_firmwarespa_504g_firmwarespa_501gspa_512g_firmwarespa_502gspa_500sspa_303_firmwarespa_301_firmwarespa_501g_firmwarespa_508gspa_514g_firmwarespa_301spa_509gspa_303spa_500ds_firmwarespa_500s_firmwarespa_509g_firmwarespa_504gspa_512gspa_500dsspa_508g_firmwareCisco Small Business SPA300, SPA500, and SPA51x Series IP Phones
CWE ID-CWE-399
Not Available
CVE-2009-2541
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.02% / 83.01%
||
7 Day CHG~0.00%
Published-20 Jul, 2009 | 18:00
Updated-23 Apr, 2025 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web browser on the Sony PLAYSTATION 3 (PS3) allows remote attackers to cause a denial of service (memory consumption and console hang) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.

Action-Not Available
Vendor-n/aSony Group Corporation
Product-playstation_3n/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-399
Not Available
CVE-2009-2844
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.74% / 81.70%
||
7 Day CHG~0.00%
Published-18 Aug, 2009 | 20:41
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cfg80211 in net/wireless/scan.c in the Linux kernel 2.6.30-rc1 and other versions before 2.6.31-rc6 allows remote attackers to cause a denial of service (crash) via a sequence of beacon frames in which one frame omits an SSID Information Element (IE) and the subsequent frame contains an SSID IE, which triggers a NULL pointer dereference in the cmp_ies function. NOTE: a potential weakness in the is_mesh function was also addressed, but the relevant condition did not exist in the code, so it is not a vulnerability.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-kernellinux_kerneln/a
CWE ID-CWE-399
Not Available
CVE-2017-12246
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-3.29% / 86.69%
||
7 Day CHG~0.00%
Published-05 Oct, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of the direct authentication feature in Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of the HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to the local IP address of an affected device. A successful exploit could allow the attacker to cause the affected device to reload. This vulnerability affects Cisco Adaptive Security Appliance (ASA) Software that is running on the following Cisco products: ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, ISA 3000 Industrial Security Appliance. Cisco Bug IDs: CSCvd59063.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwareCisco Adaptive Security Appliance Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2008-1152
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.54% / 80.64%
||
7 Day CHG~0.00%
Published-27 Mar, 2008 | 17:00
Updated-07 Aug, 2024 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ioscisco_iosn/a
CWE ID-CWE-399
Not Available
CVE-2009-2972
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.52% / 80.49%
||
7 Day CHG~0.00%
Published-27 Aug, 2009 | 17:00
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

in.lpd in the print service in Sun Solaris 8 and 9 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors that trigger a "fork()/exec() bomb."

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-solarisn/a
CWE ID-CWE-399
Not Available
CVE-2017-12362
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.89% / 74.61%
||
7 Day CHG~0.00%
Published-30 Nov, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Meeting Server versions prior to 2.2.2 could allow an authenticated, remote attacker to cause the system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to video calls being made on systems with a particular configuration. An attacker could exploit this by knowing a valid URI that directs to a Cisco Meeting Server. An attacker could then make a video call and cause the system to reload. Cisco Bug IDs: CSCve65931.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-meeting_serverCisco Meeting Server
CWE ID-CWE-399
Not Available
CVE-2009-2526
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-80.77% / 99.11%
||
7 Day CHG~0.00%
Published-14 Oct, 2009 | 10:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 do not properly validate fields in SMBv2 packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted packet to the Server service, aka "SMBv2 Infinite Loop Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_server_2008windows_vistan/a
CWE ID-CWE-399
Not Available
CVE-2009-2668
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-23.21% / 95.72%
||
7 Day CHG~0.00%
Published-05 Aug, 2009 | 19:00
Updated-17 Sep, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Internet Explorer 6 through 6.0.2900.2180 and 7 through 7.0.6000.16473 allows remote attackers to cause a denial of service (CPU consumption) via an XML document composed of a long series of start-tags with no corresponding end-tags, a related issue to CVE-2009-1232.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorern/a
CWE ID-CWE-399
Not Available
CVE-2009-1511
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-14.97% / 94.29%
||
7 Day CHG~0.00%
Published-01 May, 2009 | 18:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GDI+ in Microsoft Windows XP SP3 allows remote attackers to cause a denial of service (infinite loop) via a PNG file that contains a certain large btChunkLen value.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_xpn/a
CWE ID-CWE-399
Not Available
CVE-2021-1313
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.60% / 68.37%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:56
Updated-08 Nov, 2024 | 23:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Enf Broker Denial of Service Vulnerability

Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2009-1928
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-50.58% / 97.76%
||
7 Day CHG~0.00%
Published-11 Nov, 2009 | 19:00
Updated-07 Aug, 2024 | 05:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack consumption vulnerability in the LDAP service in Active Directory on Microsoft Windows 2000 SP4, Server 2003 SP2, and Server 2008 Gold and SP2; Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2; and Active Directory Lightweight Directory Service (AD LDS) on Windows Server 2008 Gold and SP2 allows remote attackers to cause a denial of service (system hang) via a malformed (1) LDAP or (2) LDAPS request, aka "LSASS Recursive Stack Overflow Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_vistawindows_2000windows_2003_serverwindows_xpwindows_server_2008n/a
CWE ID-CWE-399
Not Available
CVE-2008-1984
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.25% / 83.91%
||
7 Day CHG~0.00%
Published-27 Apr, 2008 | 20:00
Updated-07 Aug, 2024 | 08:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The eTrust Common Services (Transport) Daemon (eCSqdmn) in CA Secure Content Manager 8.0.28000.511 and earlier allows remote attackers to cause a denial of service (crash or CPU consumption) via a malformed packet to TCP port 1882.

Action-Not Available
Vendor-n/aBroadcom Inc.
Product-secure_content_managern/a
CWE ID-CWE-399
Not Available
CVE-2007-6523
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.35% / 79.27%
||
7 Day CHG~0.00%
Published-24 Dec, 2007 | 20:00
Updated-07 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Algorithmic complexity vulnerability in Opera 9.50 beta and 9.x before 9.25 allows remote attackers to cause a denial of service (CPU consumption) via a crafted bitmap (BMP) file that triggers a large number of calculations and checks.

Action-Not Available
Vendor-n/aOpera
Product-opera_browsern/a
CWE ID-CWE-189
Not Available
CWE ID-CWE-399
Not Available
CVE-2009-2190
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.53% / 80.55%
||
7 Day CHG~0.00%
Published-06 Aug, 2009 | 16:00
Updated-07 Aug, 2024 | 05:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

launchd in Apple Mac OS X 10.5 before 10.5.8 allows remote attackers to cause a denial of service (individual service outage) by making many connections to an inetd-based launchd service.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2007-6349
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.37% / 79.42%
||
7 Day CHG~0.00%
Published-20 Dec, 2007 | 23:00
Updated-07 Aug, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

P4Webs.exe in Perforce P4Web 2006.2 and earlier, when running on Windows, allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with an empty body and a Content-Length greater than 0.

Action-Not Available
Vendor-n/aPerforce Software, Inc.
Product-p4webn/a
CWE ID-CWE-399
Not Available
CVE-2009-2487
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.27% / 83.98%
||
7 Day CHG~0.00%
Published-16 Jul, 2009 | 16:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the frpr_icmp function in the ipfilter (aka IP Filter) subsystem in Sun Solaris 10, and OpenSolaris snv_45 through snv_110, allows remote attackers to cause a denial of service (panic) via unspecified vectors.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-opensolarissolarisn/a
CWE ID-CWE-399
Not Available
CVE-2009-2137
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.50% / 64.78%
||
7 Day CHG~0.00%
Published-19 Jun, 2009 | 19:00
Updated-07 Aug, 2024 | 05:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the Ultra-SPARC T2 crypto provider device driver (aka n2cp) in Sun Solaris 10, and OpenSolaris snv_54 through snv_112, allows context-dependent attackers to cause a denial of service (memory consumption) via unspecified vectors related to a large keylen value.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-opensolarissolarisn/a
CWE ID-CWE-399
Not Available
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found