Vulnerability Details : CVE-2006-0883
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Vulnerability category: Denial of service
Products affected by CVE-2006-0883
- cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
Threat overview for CVE-2006-0883
Top countries where our scanners detected CVE-2006-0883
Top open port discovered on systems with this issue
22
IPs affected by CVE-2006-0883 6,768
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-0883!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-0883
4.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0883
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2006-0883
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2006-0883
-
Red Hat 2006-08-30This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
References for CVE-2006-0883
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25116
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:09.openssh.asc
-
http://securityreason.com/securityalert/520
FreeBSD Security Advisory FreeBSD-SA-06:09.openssh - CXSecurity.com
-
http://www.vupen.com/english/advisories/2006/0805
Site en constructionVendor Advisory
-
http://bugzilla.mindrot.org/show_bug.cgi?id=839
839 – Privilege Separation + PAM locks users out
-
http://www.securityfocus.com/bid/16892
Patch
-
http://securitytracker.com/id?1015706
Access DeniedPatch
Jump to