Products
Solutions
Customers
Partner
Resources
Company
Careers
Community

CVE Reference: CVE-2006-5051

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2006-5051

Description:
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/29254

UBUNTU
  http://www.ubuntu.com/usn/usn-355-1

SUSE
  http://www.novell.com/linux/security/advisories/2006_62_openssh.html

ST
  1016940

SLACKWARE
  http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566

SGI

SAID
  Secunia Advisory: SA22823
  Secunia Advisory: SA22487
  Secunia Advisory: SA22495
  Secunia Advisory: SA22362
  Secunia Advisory: SA22352
  Secunia Advisory: SA22245
  Secunia Advisory: SA22208
  Secunia Advisory: SA22270
  Secunia Advisory: SA22236
  Secunia Advisory: SA22196
  Secunia Advisory: SA22183
  Secunia Advisory: SA22173
  Secunia Advisory: SA22158
  Secunia Advisory: SA22926
  Secunia Advisory: SA23680
  Secunia Advisory: SA24479
  Secunia Advisory: SA24805
  Secunia Advisory: SA24799

REDHAT
  http://www.redhat.com/support/errata/RHSA-2006-0698.html
  http://www.redhat.com/support/errata/RHSA-2006-0697.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11387

OSVDB
  29264

OPENPKG
  http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html

OPENBSD
  http://www.openbsd.org/errata.html#ssh

MLIST
  http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
  http://lists.freebsd.org/pipermail/freebsd-security/2006-October/004051.html
  http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115939141729160&w=2

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDKSA-2006:179

GENTOO
  http://security.gentoo.org/glsa/glsa-200611-06.xml

FREEBSD
  http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc

DEBIAN
  http://www.debian.org/security/2006/dsa-1212
  http://www.debian.org/security/2006/dsa-1189

CONFIRM
  http://sourceforge.net/forum/forum.php?forum_id=681763
  http://docs.info.apple.com/article.html?artnum=305214
  http://openssh.org/txt/release-4.4
  http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
  http://www.arkoon.fr/upload/alertes/43AK-2006-09-FR-1.0_SSL360_OPENSSH.pdf
  http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
  http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
  http://www.arkoon.fr/upload/alertes/36AK-2006-07-FR-1.0_FAST360_OPENSSH.pdf

CERT-VN
  851340

CERT
  http://www.us-cert.gov/cas/techalerts/TA07-072A.html

BID
  20241

APPLE
  http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html


Return to the previous page.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability