First published: Fri Dec 31 2004(Updated: )
sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.7.1p2 | |
OpenSSH | =3.6.1p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2069 is classified as a high-severity vulnerability due to its potential to allow unauthorized remote access.
To fix CVE-2004-2069, upgrade to OpenSSH versions 3.7.1p3 or later, where this issue has been addressed.
CVE-2004-2069 affects OpenSSH versions 3.6.1p2 and 3.7.1p2.
The impact of CVE-2004-2069 allows remote attackers to keep SSH sessions open, potentially leading to unauthorized access.
CVE-2004-2069 is a remote vulnerability, allowing attackers to exploit the issue from outside the affected system.