First published: Wed Apr 04 2012(Updated: )
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =5.4 | |
OpenSSH | =3.8 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =4.3p2 | |
OpenSSH | =3.2.2 | |
OpenSSH | =3.1 | |
OpenSSH | =5.5 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =1.5.8 | |
OpenSSH | =5.3 | |
OpenSSH | =4.1 | |
OpenSSH | =3.8.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =4.8 | |
OpenSSH | =4.9 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.9 | |
OpenSSH | =3.0 | |
OpenSSH | =1.2.1 | |
OpenSSH | =3.2 | |
OpenSSH | =3.6 | |
OpenSSH | =4.7 | |
OpenSSH | =1.5.7 | |
OpenSSH | =1.2.3 | |
OpenSSH | =3.7 | |
OpenSSH | <=5.8 | |
OpenSSH | =4.0p1 | |
OpenSSH | =3.5p1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =4.4 | |
OpenSSH | =3.7.1p1 | |
OpenSSH | =1.2 | |
OpenSSH | =5.2 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.9.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.0.1 | |
OpenSSH | =3.6.1 | |
OpenSSH | =4.1p1 | |
OpenSSH | =5.7 | |
OpenSSH | =1.2.2 | |
OpenSSH | =4.2p1 | |
OpenSSH | =4.5 | |
OpenSSH | =3.7.1 | |
OpenSSH | =1.2.27 | |
OpenSSH | =4.2 | |
OpenSSH | =3.4 | |
OpenSSH | =4.4p1 | |
OpenSSH | =4.3p1 | |
OpenSSH | =3.5 | |
OpenSSH | =5.1 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =5.6 | |
OpenSSH | =4.3 | |
OpenSSH | =4.0 | |
OpenSSH | =3.9.1 | |
OpenSSH | =5.0 | |
OpenSSH | =1.3 | |
OpenSSH | =1.5 | |
OpenSSH | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5000 is classified as a denial of service vulnerability.
To fix CVE-2011-5000, upgrade to OpenSSH version 5.9 or later where the vulnerability is patched.
CVE-2011-5000 affects OpenSSH versions 5.8 and earlier, particularly those using gssapi-with-mic authentication.
CVE-2011-5000 can be exploited by remote authenticated users to cause excessive memory consumption, leading to denial of service.
Yes, CVE-2011-5000 can be exploited remotely, as it targets authenticated users on the system.