OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/0805 | vdb entry vendor advisory |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:09.openssh.asc | vendor advisory |
http://www.osvdb.org/23797 | vdb entry |
http://securitytracker.com/id?1015706 | vdb entry patch |
http://securityreason.com/securityalert/520 | third party advisory |
http://www.securityfocus.com/bid/16892 | vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25116 | vdb entry |
http://bugzilla.mindrot.org/show_bug.cgi?id=839 |