First published: Tue Mar 13 2007(Updated: )
The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote attackers to cause a denial of service by connecting to the server before SSH has finished creating keys, which causes the keys to be regenerated and can break trust relationships that were based on the original keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.4.3 | |
Apple macOS Server | =10.4.3 | |
Apple iOS and macOS | =10.4.1 | |
Apple macOS Server | =10.4.2 | |
Apple macOS Server | =10.4.4 | |
Apple macOS Server | =10.4.1 | |
Apple iOS and macOS | =10.4.7 | |
Apple iOS and macOS | =10.4.4 | |
Apple macOS Server | =10.4 | |
Apple macOS Server | =10.4.5 | |
Apple iOS and macOS | =10.4 | |
Apple macOS Server | =10.4.6 | |
Apple macOS Server | =10.3.9 | |
Apple macOS Server | =10.4.8 | |
Apple iOS and macOS | =10.4.6 | |
Apple iOS and macOS | =10.4.5 | |
Apple iOS and macOS | =10.3.9 | |
Apple iOS and macOS | =10.4.8 | |
Apple macOS Server | =10.4.7 | |
Apple iOS and macOS | =10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0726 has a moderate severity rating as it can lead to denial of service in affected systems.
To fix CVE-2007-0726, users should upgrade to a patched version of OpenSSH or apply the relevant security updates provided by Apple.
CVE-2007-0726 affects Apple Mac OS X versions 10.3.9 and 10.4 through 10.4.8.
CVE-2007-0726 exploits a flaw in the SSH key generation process that allows remote attackers to cause a denial of service.
CVE-2007-0726 can break trust relationships by causing SSH to regenerate keys during an active connection, potentially compromising security.