Tavis Ormandy discovered that the SSH daemon did not properly handle authentication packets with duplicated blocks. By sending specially crafted packets, a remote attacker could exploit this to cause the ssh daemon to drain all available CPU resources until the login grace time expired. (CVE-2006-4924)
Mark Dowd discovered a race condition in the server’s signal handling. A remote attacker could exploit this to crash the server. (CVE-2006-5051)
2 October 2006
A security issue affects these releases of Ubuntu and its derivatives:
Tavis Ormandy discovered that the SSH daemon did not properly handle authentication packets with duplicated blocks. By sending specially crafted packets, a remote attacker could exploit this to cause the ssh daemon to drain all available CPU resources until the login grace time expired. (CVE-2006-4924)
Mark Dowd discovered a race condition in the server’s signal handling. A remote attacker could exploit this to crash the server. (CVE-2006-5051)
The problem can be corrected by updating your system to the following package versions:
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system upgrade is sufficient to effect the necessary changes.