CVE-2006-0883

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*

History

No history.

Information

Published : 2006-03-07 02:02

Updated : 2023-12-10 10:28


NVD link : CVE-2006-0883

Mitre link : CVE-2006-0883

CVE.ORG link : CVE-2006-0883


JSON object : View

Products Affected

openbsd

  • openssh

freebsd

  • freebsd
CWE
CWE-399

Resource Management Errors