Upstream information
Description
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 7.8 |
Vector | AV:N/AC:L/Au:N/C:N/I:N/A:C |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
SUSE Security Advisories:
- SUSE-SA:2006:062, published Fri, 20 Oct 2006 17:00:00 +0000
- SUSE-SR:2006:024, published Fri, 06 Oct 2006 14:00:00 +0000
- TID7005435, published Sa 3. Mär 10:24:20 CET 2018
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 05:12:41 2013CVE page last modified: Fri Dec 8 16:17:58 2023