First published: Wed Nov 08 2006(Updated: )
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <=4.4 | |
<=4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5794 has a moderate severity level due to the potential for attackers to bypass authentication.
To fix CVE-2006-5794, upgrade to OpenSSH version 4.5 or later.
CVE-2006-5794 affects OpenSSH versions prior to 4.5.
CVE-2006-5794 is an unspecified vulnerability related to weaker verification in the sshd Privilege Separation Monitor.
Preventing exploitations of CVE-2006-5794 can be achieved by ensuring your OpenSSH software is updated to a secure version.