cve/2008/CVE-2008-4109.md
2024-08-25 17:33:10 +00:00

29 lines
1.5 KiB
Markdown

### [CVE-2008-4109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4109)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
### POC
#### Reference
- http://www.ubuntu.com/usn/usn-649-1
#### Github
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/David-M-Berry/openssh-cve-discovery
- https://github.com/Passyed/regreSSHion-Fix
- https://github.com/TAM-K592/CVE-2024-6387
- https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
- https://github.com/bigb0x/CVE-2024-6387
- https://github.com/bigb0x/OpenSSH-Scanner
- https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
- https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
- https://github.com/ryanalieh/openSSH-scanner
- https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH