First published: Wed Sep 27 2006(Updated: )
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.8 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =3.2.2 | |
OpenSSH | =3.1 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =3.8.1 | |
OpenSSH | =2.1.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =2.5.1 | |
OpenSSH | =2.9.9p2 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.9 | |
OpenSSH | =3.0 | |
OpenSSH | =1.2.1 | |
OpenSSH | =2.2 | |
OpenSSH | =3.2 | |
OpenSSH | =3.6 | |
OpenSSH | =1.2.3 | |
OpenSSH | =3.7 | |
OpenSSH | =4.0p1 | |
OpenSSH | =3.5p1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =3.7.1p1 | |
OpenSSH | =2.1 | |
OpenSSH | =1.2 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.9.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.0.1 | |
OpenSSH | =2.9.9 | |
OpenSSH | =3.6.1 | |
OpenSSH | =4.1p1 | |
OpenSSH | =1.2.2 | |
OpenSSH | =4.2p1 | |
OpenSSH | =2.9p1 | |
OpenSSH | =2.9 | |
OpenSSH | =3.7.1 | |
OpenSSH | =1.2.27 | |
OpenSSH | =4.2 | |
OpenSSH | =2.5.2 | |
OpenSSH | =2.3 | |
OpenSSH | =3.4 | |
OpenSSH | =4.3p1 | |
OpenSSH | =3.5 | |
OpenSSH | =2.5 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =4.3 | |
OpenSSH | =4.0 | |
OpenSSH | =3.9.1 | |
OpenSSH | =2.9p2 | |
=1.2 | ||
=1.2.1 | ||
=1.2.2 | ||
=1.2.3 | ||
=1.2.27 | ||
=2.1 | ||
=2.1.1 | ||
=2.2 | ||
=2.3 | ||
=2.5 | ||
=2.5.1 | ||
=2.5.2 | ||
=2.9 | ||
=2.9.9 | ||
=2.9.9p2 | ||
=2.9p1 | ||
=2.9p2 | ||
=3.0 | ||
=3.0.1 | ||
=3.0.1p1 | ||
=3.0.2 | ||
=3.0.2p1 | ||
=3.0p1 | ||
=3.1 | ||
=3.1p1 | ||
=3.2 | ||
=3.2.2 | ||
=3.2.2p1 | ||
=3.2.3p1 | ||
=3.3 | ||
=3.3p1 | ||
=3.4 | ||
=3.4p1 | ||
=3.5 | ||
=3.5p1 | ||
=3.6 | ||
=3.6.1 | ||
=3.6.1p1 | ||
=3.6.1p2 | ||
=3.7 | ||
=3.7.1 | ||
=3.7.1p1 | ||
=3.7.1p2 | ||
=3.8 | ||
=3.8.1 | ||
=3.8.1p1 | ||
=3.9 | ||
=3.9.1 | ||
=3.9.1p1 | ||
=4.0 | ||
=4.0p1 | ||
=4.1p1 | ||
=4.2 | ||
=4.2p1 | ||
=4.3 | ||
=4.3p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4924 is classified as a high severity vulnerability due to its potential to cause denial of service.
CVE-2006-4924 allows remote attackers to consume CPU resources, leading to denial of service via specially crafted SSH packets.
CVE-2006-4924 affects versions of OpenSSH prior to 4.4 that utilize SSH protocol version 1.
Mitigation for CVE-2006-4924 involves upgrading to OpenSSH version 4.4 or later, which includes fixes for this vulnerability.
While CVE-2006-4924 specifically targets SSH protocol version 1, it highlights underlying weaknesses in older SSH implementations that may be exploited.