5
CVSSv2

CVE-2008-4109

Published: 18/09/2008 Updated: 08/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A certain Debian patch for OpenSSH prior to 4.3p2-9etch3 on etch; prior to 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote malicious users to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh 3.8.1p1

openbsd openssh 3.9

openbsd openssh 3.0.2p1

openbsd openssh 2.5

openbsd openssh 1.3

openbsd openssh 1.5

openbsd openssh 3.1p1

openbsd openssh 3.0.1

openbsd openssh 2.9.9p2

openbsd openssh 2.5.2

openbsd openssh 3.7.1p1

openbsd openssh 3.5p1

openbsd openssh 3.6

openbsd openssh 3.2.2

openbsd openssh 3.2.2p1

openbsd openssh

openbsd openssh 3.9.1

openbsd openssh 3.9.1p1

openbsd openssh 2.1.1

openbsd openssh 2.2

openbsd openssh 1.2.27

openbsd openssh 1.2.3

openbsd openssh 1.2.1

openbsd openssh 3.0p1

openbsd openssh 3.0.2

openbsd openssh 2.5.1

openbsd openssh 2.9p1

openbsd openssh 3.6.1

openbsd openssh 3.6.1p1

openbsd openssh 3.2.3p1

openbsd openssh 3.3

openbsd openssh 3.8

openbsd openssh 3.8.1

openbsd openssh 2.3.1

openbsd openssh 2.3

openbsd openssh 1.5.7

openbsd openssh 1.5.8

openbsd openssh 3.1

openbsd openssh 3.2

openbsd openssh 2.9p2

openbsd openssh 3.0

openbsd openssh 3.7

openbsd openssh 3.7.1

openbsd openssh 3.4p1

openbsd openssh 3.5

openbsd openssh 4.3

openbsd openssh 4.3p1

openbsd openssh 4.0p1

openbsd openssh 4.1p1

openbsd openssh 3.7.1p2

openbsd openssh 4.0

openbsd openssh 4.1

openbsd openssh 2

openbsd openssh 2.1

openbsd openssh 1.2.2

openbsd openssh 1.2

openbsd openssh 3.0.1p1

openbsd openssh 2.9.9

openbsd openssh 2.9

openbsd openssh 3.6.1p2

openbsd openssh 3.3p1

openbsd openssh 3.4

openbsd openssh 4.2

openbsd openssh 4.2p1

openbsd openssh 4.3p2

openbsd openssh 4.4

openbsd openssh 4.4p1

Vendor Advisories

It was discovered that the ForceCommand directive could be bypassed If a local user created a malicious ~/ssh/rc file, they could execute arbitrary commands as their user id This only affected Ubuntu 710 (CVE-2008-1657) ...
It has been discovered that the signal handler implementing the login timeout in Debian's version of the OpenSSH server uses functions which are not async-signal-safe, leading to a denial of service vulnerability (CVE-2008-4109) The problem was originally corrected in OpenSSH 44p1 (CVE-2006-5051), but the patch backported to the version released ...