Summary: | <net-misc/openssh-6.6_p1-r1: mitigate connection slot exhaustion attacks (CVE-2010-5107) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system, steffen.weber |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=908707 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-02-07 12:37:54 UTC
the DoS can't be prevented, just [further] mitigated CVE-2010-5107 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107): The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections. Default values from MaxStartups is correct in current stable openssh in Gentoo(net-misc/openssh-6.6_p1-r1), so, i assume this is fixed. Added this to existing GLSA draft This issue was resolved and addressed in GLSA 201405-06 at http://security.gentoo.org/glsa/glsa-201405-06.xml by GLSA coordinator Mikle Kolyada (Zlogene). |