Description
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVSS vector
AV:N/AC:M/C:N/I:N/A:PExploitability: 6.8 | Impact: 2.9Confidentiality: None
Integrity: None
Affected Packages2 packages
🔴Vulnerability Details
3GHSAGHSA-wq52-9gh8-cwrp: The ssh_gssapi_parse_ename function in gss-serv↗2022-05-17 ▶ OSVCVE-2011-5000: The ssh_gssapi_parse_ename function in gss-serv↗2012-04-05 ▶ CVEListCVE-2011-5000: The ssh_gssapi_parse_ename function in gss-serv↗2012-04-04 ▶ 💥Exploits & PoCs
2Exploit-DBCyberLink (Multiple Products) - File Project Handling Stack Buffer Overflow (PoC)↗2011-12-09 ▶ Exploit-DBRockwell RSLogix 19 - Denial of Service↗2011-09-14 ▶ 📋Vendor Advisories
2Red Hatopenssh: post-authentication resource exhaustion bug via GSSAPI↗2011-08-01 ▶ DebianCVE-2011-5000: openssh - The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, wh...↗2011 ▶ 💬Community
2BugzillaCVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI↗2012-04-04 ▶ BugzillaCVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI [fedora-all]↗2012-04-04 ▶