mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
458 lines
15 KiB
JSON
458 lines
15 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-4924",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/447153/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released",
|
|
"refsource" : "MLIST",
|
|
"url" : "http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2"
|
|
},
|
|
{
|
|
"name" : "[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability",
|
|
"refsource" : "MLIST",
|
|
"url" : "http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955",
|
|
"refsource" : "MISC",
|
|
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955"
|
|
},
|
|
{
|
|
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=148228",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=148228"
|
|
},
|
|
{
|
|
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm"
|
|
},
|
|
{
|
|
"name" : "http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227"
|
|
},
|
|
{
|
|
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm"
|
|
},
|
|
{
|
|
"name" : "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
|
|
},
|
|
{
|
|
"name" : "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
|
|
},
|
|
{
|
|
"name" : "https://issues.rpath.com/browse/RPL-661",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://issues.rpath.com/browse/RPL-661"
|
|
},
|
|
{
|
|
"name" : "http://docs.info.apple.com/article.html?artnum=305214",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://docs.info.apple.com/article.html?artnum=305214"
|
|
},
|
|
{
|
|
"name" : "http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability"
|
|
},
|
|
{
|
|
"name" : "http://sourceforge.net/forum/forum.php?forum_id=681763",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://sourceforge.net/forum/forum.php?forum_id=681763"
|
|
},
|
|
{
|
|
"name" : "https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2007-03-13",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
|
|
},
|
|
{
|
|
"name" : "DSA-1189",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2006/dsa-1189"
|
|
},
|
|
{
|
|
"name" : "DSA-1212",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2006/dsa-1212"
|
|
},
|
|
{
|
|
"name" : "FreeBSD-SA-06:22.openssh",
|
|
"refsource" : "FREEBSD",
|
|
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc"
|
|
},
|
|
{
|
|
"name" : "FreeBSD-SA-06:22",
|
|
"refsource" : "FREEBSD",
|
|
"url" : "http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc"
|
|
},
|
|
{
|
|
"name" : "GLSA-200609-17",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-200609-17.xml"
|
|
},
|
|
{
|
|
"name" : "GLSA-200611-06",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-200611-06.xml"
|
|
},
|
|
{
|
|
"name" : "HPSBUX02178",
|
|
"refsource" : "HP",
|
|
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"
|
|
},
|
|
{
|
|
"name" : "SSRT061267",
|
|
"refsource" : "HP",
|
|
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2006:179",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:179"
|
|
},
|
|
{
|
|
"name" : "[2.9] 015: SECURITY FIX: October 12, 2006",
|
|
"refsource" : "OPENBSD",
|
|
"url" : "http://www.openbsd.org/errata.html#ssh"
|
|
},
|
|
{
|
|
"name" : "OpenPKG-SA-2006.022",
|
|
"refsource" : "OPENPKG",
|
|
"url" : "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2006:0698",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0698.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2006:0697",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0697.html"
|
|
},
|
|
{
|
|
"name" : "SCOSA-2008.2",
|
|
"refsource" : "SCO",
|
|
"url" : "ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt"
|
|
},
|
|
{
|
|
"name" : "20061001-01-P",
|
|
"refsource" : "SGI",
|
|
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
|
|
},
|
|
{
|
|
"name" : "SSA:2006-272-02",
|
|
"refsource" : "SLACKWARE",
|
|
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566"
|
|
},
|
|
{
|
|
"name" : "102962",
|
|
"refsource" : "SUNALERT",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1"
|
|
},
|
|
{
|
|
"name" : "SUSE-SR:2006:024",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://www.novell.com/linux/security/advisories/2006_24_sr.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SA:2006:062",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://www.novell.com/linux/security/advisories/2006_62_openssh.html"
|
|
},
|
|
{
|
|
"name" : "2006-0054",
|
|
"refsource" : "TRUSTIX",
|
|
"url" : "http://www.trustix.org/errata/2006/0054"
|
|
},
|
|
{
|
|
"name" : "USN-355-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/usn-355-1"
|
|
},
|
|
{
|
|
"name" : "TA07-072A",
|
|
"refsource" : "CERT",
|
|
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
|
|
},
|
|
{
|
|
"name" : "VU#787448",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/787448"
|
|
},
|
|
{
|
|
"name" : "20216",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/20216"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:10462",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462"
|
|
},
|
|
{
|
|
"name" : "34274",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/34274"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-3777",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/3777"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-4401",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/4401"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-4869",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/4869"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-0930",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/0930"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-1332",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/1332"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-2119",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/2119"
|
|
},
|
|
{
|
|
"name" : "29152",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/29152"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1193",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193"
|
|
},
|
|
{
|
|
"name" : "1016931",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016931"
|
|
},
|
|
{
|
|
"name" : "22091",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22091"
|
|
},
|
|
{
|
|
"name" : "21923",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/21923"
|
|
},
|
|
{
|
|
"name" : "22164",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22164"
|
|
},
|
|
{
|
|
"name" : "22158",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22158"
|
|
},
|
|
{
|
|
"name" : "22183",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22183"
|
|
},
|
|
{
|
|
"name" : "22196",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22196"
|
|
},
|
|
{
|
|
"name" : "22236",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22236"
|
|
},
|
|
{
|
|
"name" : "22270",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22270"
|
|
},
|
|
{
|
|
"name" : "22116",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22116"
|
|
},
|
|
{
|
|
"name" : "22208",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22208"
|
|
},
|
|
{
|
|
"name" : "22245",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22245"
|
|
},
|
|
{
|
|
"name" : "22352",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22352"
|
|
},
|
|
{
|
|
"name" : "22362",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22362"
|
|
},
|
|
{
|
|
"name" : "22495",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22495"
|
|
},
|
|
{
|
|
"name" : "22487",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22487"
|
|
},
|
|
{
|
|
"name" : "22823",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22823"
|
|
},
|
|
{
|
|
"name" : "22926",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22926"
|
|
},
|
|
{
|
|
"name" : "23038",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23038"
|
|
},
|
|
{
|
|
"name" : "23241",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23241"
|
|
},
|
|
{
|
|
"name" : "22298",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22298"
|
|
},
|
|
{
|
|
"name" : "23340",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23340"
|
|
},
|
|
{
|
|
"name" : "23680",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23680"
|
|
},
|
|
{
|
|
"name" : "24479",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24479"
|
|
},
|
|
{
|
|
"name" : "24805",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24805"
|
|
},
|
|
{
|
|
"name" : "25608",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25608"
|
|
},
|
|
{
|
|
"name" : "24799",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24799"
|
|
},
|
|
{
|
|
"name" : "29371",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/29371"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-0740",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/0740"
|
|
},
|
|
{
|
|
"name" : "openssh-block-dos(29158)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29158"
|
|
}
|
|
]
|
|
}
|
|
}
|