5
CVSSv2

CVE-2004-2069

Published: 31/12/2004 Updated: 19/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote malicious users to cause a denial of service (connection consumption).

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh 3.6.1p2

openbsd openssh 3.7.1p2

Vendor Advisories

Synopsis openssh security update Type/Severity Security Advisory: Low Topic Updated openssh packages that fix a potential security vulnerability andvarious other bugs are now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description ...