Unknown
CVE-2008-4109
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- openssh,
- openssh 1.2,
- openssh 1.2.1,
- openssh 1.2.2,
- openssh 1.2.27,
- openssh 1.2.3,
- openssh 1.3,
- openssh 1.5,
- openssh 1.5.7,
- openssh 1.5.8,
- openssh 2,
- openssh 2.1,
- openssh 2.1.1,
- openssh 2.2,
- openssh 2.3,
- openssh 2.3.1,
- openssh 2.5,
- openssh 2.5.1,
- openssh 2.5.2,
- openssh 2.9,
- openssh 2.9.9,
- openssh 2.9.9p2,
- openssh 2.9p1,
- openssh 2.9p2,
- openssh 3.0,
- openssh 3.0.1,
- openssh 3.0.1p1,
- openssh 3.0.2,
- openssh 3.0.2p1,
- openssh 3.0p1,
- openssh 3.1,
- openssh 3.1p1,
- openssh 3.2,
- openssh 3.2.2,
- openssh 3.2.2p1,
- openssh 3.2.3p1,
- openssh 3.3,
- openssh 3.3p1,
- openssh 3.4,
- openssh 3.4p1,
- openssh 3.5,
- openssh 3.5p1,
- openssh 3.6,
- openssh 3.6.1,
- openssh 3.6.1p1,
- openssh 3.6.1p2,
- openssh 3.7,
- openssh 3.7.1,
- openssh 3.7.1p1,
- openssh 3.7.1p2,
- openssh 3.8,
- openssh 3.8.1,
- openssh 3.8.1p1,
- openssh 3.9,
- openssh 3.9.1,
- openssh 3.9.1p1,
- openssh 4.0,
- openssh 4.0p1,
- openssh 4.1,
- openssh 4.1p1,
- openssh 4.2,
- openssh 4.2p1,
- openssh 4.3,
- openssh 4.3p1,
- openssh 4.3p2,
- openssh 4.4,
- openssh 4.4p1
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: