Summary: | <net-misc/openssh-5.9_p1-r4 : post-authentication resource exhaustion bug via GSSAPI (CVE-2011-5000) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system, robbat2 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=809938 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 396075 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2012-04-05 12:23:28 UTC
looks like it's already fixed in 5.9_p1. so just stabilize openssh-5.9_p1-r4. CVE-2011-5000 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5000): The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant. Added to existing glsa request. This issue was resolved and addressed in GLSA 201405-06 at http://security.gentoo.org/glsa/glsa-201405-06.xml by GLSA coordinator Mikle Kolyada (Zlogene). |