CVE-2011-5000Uncontrolled Resource Consumption in Openssh

Severity
3.5LOWNVD
EPSS
0.4%
top 40.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 5
Latest updateMay 17

Description

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 6.8 | Impact: 2.9

Affected Packages2 packages

Debianopenbsd/openssh< 1:5.9p1-1+3
NVDopenbsd/openssh5.8+65

🔴Vulnerability Details

3
GHSA
GHSA-wq52-9gh8-cwrp: The ssh_gssapi_parse_ename function in gss-serv2022-05-17
OSV
CVE-2011-5000: The ssh_gssapi_parse_ename function in gss-serv2012-04-05
CVEList
CVE-2011-5000: The ssh_gssapi_parse_ename function in gss-serv2012-04-04

💥Exploits & PoCs

2
Exploit-DB
CyberLink (Multiple Products) - File Project Handling Stack Buffer Overflow (PoC)2011-12-09
Exploit-DB
Rockwell RSLogix 19 - Denial of Service2011-09-14

📋Vendor Advisories

2
Red Hat
openssh: post-authentication resource exhaustion bug via GSSAPI2011-08-01
Debian
CVE-2011-5000: openssh - The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, wh...2011

💬Community

2
Bugzilla
CVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI2012-04-04
Bugzilla
CVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI [fedora-all]2012-04-04
CVE-2011-5000 — Uncontrolled Resource Consumption | cvebase