OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
2006-03-07T02:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | openbsd | openssh | 3.8.1p1 | Yes |
Operating System | freebsd | freebsd | 5.3 | Yes |
Operating System | freebsd | freebsd | 5.3 | Yes |
Operating System | freebsd | freebsd | 5.3 | Yes |
Operating System | freebsd | freebsd | 5.3 | Yes |
Operating System | freebsd | freebsd | 5.4 | Yes |
Operating System | freebsd | freebsd | 5.4 | Yes |
Operating System | freebsd | freebsd | 5.4 | Yes |
Operating System | freebsd | freebsd | 5.4 | Yes |