Lucene search

K
osvGoogleOSV:DSA-1189-1
HistoryOct 04, 2006 - 12:00 a.m.

openssh-krb5

2006-10-0400:00:00
Google
osv.dev
13

0.946 High

EPSS

Percentile

99.3%

Several remote vulnerabilities have been discovered in OpenSSH, a free
implementation of the Secure Shell protocol, which may lead to denial of
service and potentially the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2006-4924
    Tavis Ormandy of the Google Security Team discovered a denial of
    service vulnerability in the mitigation code against complexity
    attacks, which might lead to increased CPU consumption until a
    timeout is triggered. This is only exploitable if support for
    SSH protocol version 1 is enabled.
  • CVE-2006-5051
    Mark Dowd discovered that insecure signal handler usage could
    potentially lead to execution of arbitrary code through a double
    free. The Debian Security Team doesn’t believe the general openssh
    package without Kerberos support to be exploitable by this issue.
    However, due to the complexity of the underlying code we will
    issue an update to rule out all eventualities.

For the stable distribution (sarge) these problems have been fixed in
version 3.8.1p1-7sarge1.

For the unstable distribution (sid) these problems have been fixed in
version 4.3p2-4 of openssh. openssh-krb5 will soon be converted towards
a transitional package against openssh.

We recommend that you upgrade your openssh-krb5 packages.

CPENameOperatorVersion
openssh-krb5eq3.8.1p1-7