First published: Tue Mar 07 2006(Updated: )
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | =3.8.1p1 | |
FreeBSD FreeBSD | =5.4-releng | |
FreeBSD FreeBSD | =5.3-release | |
FreeBSD FreeBSD | =5.3 | |
FreeBSD FreeBSD | =5.4-stable | |
FreeBSD FreeBSD | =5.4-pre-release | |
FreeBSD FreeBSD | =5.4-release | |
FreeBSD FreeBSD | =5.3-stable | |
FreeBSD FreeBSD | =5.3-releng |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.