CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
72.0%
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
Vendor | Product | Version | CPE |
---|---|---|---|
openbsd | openssh | * | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* |
openbsd | openssh | 1.2 | cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.1 | cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.2 | cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.3 | cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.27 | cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:* |
openbsd | openssh | 1.3 | cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:* |
openbsd | openssh | 1.5 | cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:* |
openbsd | openssh | 1.5.7 | cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:* |
openbsd | openssh | 1.5.8 | cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:* |