OpenSSH Privilege Separation LoginGraceTime DoS

2004-01-27T22:56:06
ID OSVDB:16567
Type osvdb
Reporter Kumaresh(kumaresh_ind@gmx.net)
Modified 2004-01-27T22:56:06

Description

Vulnerability Description

OpenSSH contains a flaw that may allow a remote denial of service. The issue is triggered when a session has been terminated after exceeding the LoginGraceTime setting. The connection is not properly closed and could lead to a connection consumption attack, causing further connections to be refused. This will result in loss of availability for the ssh service.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Darren Tucker has released a patch to address this vulnerability.

Short Description

OpenSSH contains a flaw that may allow a remote denial of service. The issue is triggered when a session has been terminated after exceeding the LoginGraceTime setting. The connection is not properly closed and could lead to a connection consumption attack, causing further connections to be refused. This will result in loss of availability for the ssh service.

References:

Vendor Specific Advisory URL Vendor Specific Advisory URL Vendor Specific Advisory URL Vendor Specific Advisory URL Vendor Specific Advisory URL Secunia Advisory ID:17000 Secunia Advisory ID:17135 Secunia Advisory ID:22875 Secunia Advisory ID:17252 Secunia Advisory ID:23680 RedHat RHSA: RHSA-2005:550 Other Advisory URL: ftp://patches.sgi.com/support/free/security/advisories/20051002-01-U.asc Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0212.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0211.html Mail List Post: http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=107520317020444&w=2 Mail List Post: http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=107529205602320&w=2 Keyword: VMSA-2006-0007 Keyword: VMSA-2006-0008 Keyword: TCP Port 22 Keyword: VMSA-2006-0006 ISS X-Force ID: 20930 FrSIRT Advisory: ADV-2006-4502 CVE-2004-2069 Bugtraq ID: 14963