First published: Tue Mar 14 2006(Updated: )
Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbear SSH | <=0.47 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-1206 is considered to be high due to its potential for causing a denial of service.
To fix CVE-2006-1206, update Dropbear SSH to version 0.48 or later which resolves the connection slot exhaustion issue.
CVE-2006-1206 affects Dropbear SSH server versions 0.47 and earlier, primarily used in embedded Linux devices.
CVE-2006-1206 enables remote attackers to perform a denial of service attack through connection slot exhaustion.
Configurations using the MAX_UNAUTH_CLIENTS setting without proper limits are particularly vulnerable to CVE-2006-1206.