First published: Wed Sep 27 2006(Updated: )
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.8 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =3.2.2 | |
OpenSSH | =3.1 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =3.8.1 | |
OpenSSH | =2.1.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =2.5.1 | |
OpenSSH | =2.9.9p2 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.9 | |
OpenSSH | =3.0 | |
OpenSSH | =1.2.1 | |
OpenSSH | =2.2 | |
OpenSSH | =3.2 | |
OpenSSH | =3.6 | |
OpenSSH | =1.2.3 | |
OpenSSH | =3.7 | |
OpenSSH | =4.0p1 | |
OpenSSH | =3.5p1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =3.7.1p1 | |
OpenSSH | =2.1 | |
OpenSSH | =1.2 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.9.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.0.1 | |
OpenSSH | =2.9.9 | |
OpenSSH | =3.6.1 | |
OpenSSH | =4.1p1 | |
OpenSSH | =1.2.2 | |
OpenSSH | =4.2p1 | |
OpenSSH | =2.9p1 | |
OpenSSH | =2.9 | |
OpenSSH | =3.7.1 | |
OpenSSH | =1.2.27 | |
OpenSSH | =4.2 | |
OpenSSH | =2.5.2 | |
OpenSSH | =2.3 | |
OpenSSH | =3.4 | |
OpenSSH | =4.3p1 | |
OpenSSH | =3.5 | |
OpenSSH | =2.5 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =4.3 | |
OpenSSH | =4.0 | |
OpenSSH | =3.9.1 | |
OpenSSH | =2.9p2 | |
=1.2 | ||
=1.2.1 | ||
=1.2.2 | ||
=1.2.3 | ||
=1.2.27 | ||
=2.1 | ||
=2.1.1 | ||
=2.2 | ||
=2.3 | ||
=2.5 | ||
=2.5.1 | ||
=2.5.2 | ||
=2.9 | ||
=2.9.9 | ||
=2.9.9p2 | ||
=2.9p1 | ||
=2.9p2 | ||
=3.0 | ||
=3.0.1 | ||
=3.0.1p1 | ||
=3.0.2 | ||
=3.0.2p1 | ||
=3.0p1 | ||
=3.1 | ||
=3.1p1 | ||
=3.2 | ||
=3.2.2 | ||
=3.2.2p1 | ||
=3.2.3p1 | ||
=3.3 | ||
=3.3p1 | ||
=3.4 | ||
=3.4p1 | ||
=3.5 | ||
=3.5p1 | ||
=3.6 | ||
=3.6.1 | ||
=3.6.1p1 | ||
=3.6.1p2 | ||
=3.7 | ||
=3.7.1 | ||
=3.7.1p1 | ||
=3.7.1p2 | ||
=3.8 | ||
=3.8.1 | ||
=3.8.1p1 | ||
=3.9 | ||
=3.9.1 | ||
=3.9.1p1 | ||
=4.0 | ||
=4.0p1 | ||
=4.1p1 | ||
=4.2 | ||
=4.2p1 | ||
=4.3 | ||
=4.3p1 |
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5052 has been classified as a moderate severity vulnerability.
To fix CVE-2006-5052, you should upgrade to OpenSSH version 4.4 or later.
CVE-2006-5052 affects portable OpenSSH running on certain unspecified platforms.
CVE-2006-5052 allows remote attackers to determine the validity of usernames through GSSAPI authentication aborts.
CVE-2006-5052 may still be a concern if outdated versions of OpenSSH are in use, especially in legacy systems.