4

CVE-2010-4755

Exploit

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.

Data is provided by the National Vulnerability Database (NVD)
OpenbsdOpenssh Version <= 5.8
OpenbsdOpenssh Version1.2
OpenbsdOpenssh Version1.2.1
OpenbsdOpenssh Version1.2.2
OpenbsdOpenssh Version1.2.3
OpenbsdOpenssh Version1.2.27
OpenbsdOpenssh Version1.3
OpenbsdOpenssh Version1.5
OpenbsdOpenssh Version1.5.7
OpenbsdOpenssh Version1.5.8
OpenbsdOpenssh Version2.1
OpenbsdOpenssh Version2.1.1
OpenbsdOpenssh Version2.2
OpenbsdOpenssh Version2.3
OpenbsdOpenssh Version2.3.1
OpenbsdOpenssh Version2.5
OpenbsdOpenssh Version2.5.1
OpenbsdOpenssh Version2.5.2
OpenbsdOpenssh Version2.9
OpenbsdOpenssh Version2.9.9
OpenbsdOpenssh Version2.9.9p2
OpenbsdOpenssh Version2.9p1
OpenbsdOpenssh Version2.9p2
OpenbsdOpenssh Version3.0
OpenbsdOpenssh Version3.0.1
OpenbsdOpenssh Version3.0.1p1
OpenbsdOpenssh Version3.0.2
OpenbsdOpenssh Version3.0.2p1
OpenbsdOpenssh Version3.0p1
OpenbsdOpenssh Version3.1
OpenbsdOpenssh Version3.1p1
OpenbsdOpenssh Version3.2
OpenbsdOpenssh Version3.2.2
OpenbsdOpenssh Version3.2.2p1
OpenbsdOpenssh Version3.2.3p1
OpenbsdOpenssh Version3.3
OpenbsdOpenssh Version3.3p1
OpenbsdOpenssh Version3.4
OpenbsdOpenssh Version3.4p1
OpenbsdOpenssh Version3.5
OpenbsdOpenssh Version3.5p1
OpenbsdOpenssh Version3.6
OpenbsdOpenssh Version3.6.1
OpenbsdOpenssh Version3.6.1p1
OpenbsdOpenssh Version3.6.1p2
OpenbsdOpenssh Version3.7
OpenbsdOpenssh Version3.7.1
OpenbsdOpenssh Version3.7.1p1
OpenbsdOpenssh Version3.7.1p2
OpenbsdOpenssh Version3.8
OpenbsdOpenssh Version3.8.1
OpenbsdOpenssh Version3.8.1p1
OpenbsdOpenssh Version3.9
OpenbsdOpenssh Version3.9.1
OpenbsdOpenssh Version3.9.1p1
OpenbsdOpenssh Version4.0
OpenbsdOpenssh Version4.0p1
OpenbsdOpenssh Version4.1
OpenbsdOpenssh Version4.1p1
OpenbsdOpenssh Version4.2
OpenbsdOpenssh Version4.2p1
OpenbsdOpenssh Version4.3
OpenbsdOpenssh Version4.3p1
OpenbsdOpenssh Version4.3p2
OpenbsdOpenssh Version4.4
OpenbsdOpenssh Version4.4p1
OpenbsdOpenssh Version4.5
OpenbsdOpenssh Version4.6
OpenbsdOpenssh Version4.7
OpenbsdOpenssh Version4.7p1
OpenbsdOpenssh Version4.8
OpenbsdOpenssh Version4.9
OpenbsdOpenssh Version5.0
OpenbsdOpenssh Version5.1
OpenbsdOpenssh Version5.2
OpenbsdOpenssh Version5.3
OpenbsdOpenssh Version5.4
OpenbsdOpenssh Version5.5
OpenbsdOpenssh Version5.6
OpenbsdOpenssh Version5.7
FreebsdFreebsd Version7.3
FreebsdFreebsd Version8.1
NetbsdNetbsd Version5.0.2
OpenbsdOpenbsd Version4.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.15% 0.357
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:N/I:N/A:P