CVE-2006-5052

Scores

EPSS

0.150very_low15.0%
0%20%40%60%80%100%

Percentile: 15.0%

CVSS

5.0medium2.0
0246810

CVSS Score: 5.0/10

All CVSS Scores

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Description

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI “authentication abort.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

Related Vulnerabilities

Exploits

Exploit ID: 2444

Source: exploitdb

URL: https://www.exploit-db.com/exploits/2444

Recommendations

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriateRPMs being upgraded on your system.

URL: http://rhn.redhat.com/errata/RHSA-2006-0697.html

Vulnerable Software (5)

Type: Configuration

Product: openssh

Operating System: rhel 4

Trait:
{  "fixed": "3.9p1-8.RHEL4.24"}

Source: redhat

Type: Configuration

Product: openssh

Operating System: rhel 5

Trait:
{  "fixed": "4.3p2-24.el5"}

Source: redhat

Type: Configuration

Product: openssh

Operating System: debian etch 4

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: openssh

Operating System: debian

Trait:
{  "fixed": "1:4.6p1-1"}

Source: debian

Type: Configuration

Vendor: *

Product: openssh

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*",     ...

Source: nvd

End of list