CVE-2010-5107Uncontrolled Resource Consumption in Openssh

Severity
5.0MEDIUMNVD
EPSS
1.9%
top 16.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 7
Latest updateMay 17

Description

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages2 packages

Debianopenbsd/openssh< 1:6.0p1-4+3
NVDopenbsd/openssh6.1+82

🔴Vulnerability Details

3
GHSA
GHSA-w6q4-qg4h-298g: The default configuration of OpenSSH through 62022-05-17
OSV
CVE-2010-5107: The default configuration of OpenSSH through 62013-03-07
CVEList
CVE-2010-5107: The default configuration of OpenSSH through 62013-03-07

💥Exploits & PoCs

1
Exploit-DB
Ask.com Toolbar - 'askBar.dll' ActiveX Control Buffer Overflow (Metasploit)2010-05-09

📋Vendor Advisories

2
Red Hat
openssh: Prevent connection slot exhaustion attacks2013-02-06
Debian
CVE-2010-5107: openssh - The default configuration of OpenSSH through 6.1 enforces a fixed time limit bet...2010

💬Community

2
Bugzilla
CVE-2010-5107 openssh: Prevent connection slot exhaustion attacks [fedora-all]2013-02-07
Bugzilla
CVE-2010-5107 openssh: Prevent connection slot exhaustion attacks2013-02-07
CVE-2010-5107 — Uncontrolled Resource Consumption | cvebase