CVE-2004-2069Openssh vulnerability

8 documents7 sources
Severity
5.0MEDIUMNVD
EPSS
4.9%
top 10.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31
Latest updateApr 29

Description

sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages2 packages

Debianopenbsd/openssh< 1:3.8p1+3
NVDopenbsd/openssh3.6.1p2, 3.7.1p2+1

🔴Vulnerability Details

3
GHSA
GHSA-pwvm-3xfp-52vg: sshd2022-04-29
CVEList
CVE-2004-2069: sshd2005-05-05
OSV
CVE-2004-2069: sshd2004-12-31

📋Vendor Advisories

2
Red Hat
security flaw2004-01-27
Debian
CVE-2004-2069: openssh - sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using pr...2004

💬Community

1
Bugzilla
CVE-2004-2069 security flaw2018-08-16
CVE-2004-2069 — Openbsd Openssh vulnerability | cvebase