Unknown
CVE-2010-4755
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- freebsd 7.3,
- freebsd 8.1,
- netbsd 5.0.2,
- openbsd 4.7,
- openssh,
- openssh 1.2,
- openssh 1.2.1,
- openssh 1.2.2,
- openssh 1.2.27,
- openssh 1.2.3,
- openssh 1.3,
- openssh 1.5,
- openssh 1.5.7,
- openssh 1.5.8,
- openssh 2.1,
- openssh 2.1.1,
- openssh 2.2,
- openssh 2.3,
- openssh 2.3.1,
- openssh 2.5,
- openssh 2.5.1,
- openssh 2.5.2,
- openssh 2.9,
- openssh 2.9.9,
- openssh 2.9.9p2,
- openssh 2.9p1,
- openssh 2.9p2,
- openssh 3.0,
- openssh 3.0.1,
- openssh 3.0.1p1,
- openssh 3.0.2,
- openssh 3.0.2p1,
- openssh 3.0p1,
- openssh 3.1,
- openssh 3.1p1,
- openssh 3.2,
- openssh 3.2.2,
- openssh 3.2.2p1,
- openssh 3.2.3p1,
- openssh 3.3,
- openssh 3.3p1,
- openssh 3.4,
- openssh 3.4p1,
- openssh 3.5,
- openssh 3.5p1,
- openssh 3.6,
- openssh 3.6.1,
- openssh 3.6.1p1,
- openssh 3.6.1p2,
- openssh 3.7,
- openssh 3.7.1,
- openssh 3.7.1p1,
- openssh 3.7.1p2,
- openssh 3.8,
- openssh 3.8.1,
- openssh 3.8.1p1,
- openssh 3.9,
- openssh 3.9.1,
- openssh 3.9.1p1,
- openssh 4.0,
- openssh 4.0p1,
- openssh 4.1,
- openssh 4.1p1,
- openssh 4.2,
- openssh 4.2p1,
- openssh 4.3,
- openssh 4.3p1,
- openssh 4.3p2,
- openssh 4.4,
- openssh 4.4p1,
- openssh 4.5,
- openssh 4.6,
- openssh 4.7,
- openssh 4.7p1,
- openssh 4.8,
- openssh 4.9,
- openssh 5.0,
- openssh 5.1,
- openssh 5.2,
- openssh 5.3,
- openssh 5.4,
- openssh 5.5,
- openssh 5.6,
- openssh 5.7
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: