5

CVE-2006-0883

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

Data is provided by the National Vulnerability Database (NVD)
OpenbsdOpenssh Version3.8.1p1
FreebsdFreebsd Version5.3
FreebsdFreebsd Version5.3 Updaterelease
FreebsdFreebsd Version5.3 Updatereleng
FreebsdFreebsd Version5.3 Updatestable
FreebsdFreebsd Version5.4 Updatepre-release
FreebsdFreebsd Version5.4 Updaterelease
FreebsdFreebsd Version5.4 Updatereleng
FreebsdFreebsd Version5.4 Updatestable
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.97% 0.829
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P