{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-09-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-17T20:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"FreeBSD-SA-06:22","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc"},{"tags":["x_refsource_CONFIRM"],"url":"http://sourceforge.net/forum/forum.php?forum_id=681763"},{"tags":["x_refsource_CONFIRM"],"url":"http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability"},{"name":"22270","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22270"},{"name":"HPSBUX02178","tags":["vendor-advisory","x_refsource_HP"],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"name":"23038","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23038"},{"name":"USN-355-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-355-1"},{"name":"2006-0054","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2006/0054"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"},{"name":"ADV-2006-4401","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4401"},{"tags":["x_refsource_CONFIRM"],"url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227"},{"name":"ADV-2009-0740","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0740"},{"name":"22116","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22116"},{"name":"21923","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21923"},{"name":"24805","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24805"},{"name":"23340","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23340"},{"name":"[2.9] 015: SECURITY FIX: October 12, 2006","tags":["vendor-advisory","x_refsource_OPENBSD"],"url":"http://www.openbsd.org/errata.html#ssh"},{"name":"SUSE-SR:2006:024","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2006_24_sr.html"},{"name":"22487","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22487"},{"name":"TA07-072A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"name":"GLSA-200611-06","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200611-06.xml"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm"},{"tags":["x_refsource_CONFIRM"],"url":"http://bugs.gentoo.org/show_bug.cgi?id=148228"},{"name":"22164","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22164"},{"name":"102962","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1"},{"name":"SUSE-SA:2006:062","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2006_62_openssh.html"},{"name":"22362","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22362"},{"name":"23680","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23680"},{"name":"APPLE-SA-2007-03-13","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"},{"name":"34274","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/34274"},{"name":"VU#787448","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/787448"},{"tags":["x_refsource_CONFIRM"],"url":"http://docs.info.apple.com/article.html?artnum=305214"},{"name":"1016931","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016931"},{"name":"ADV-2006-4869","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4869"},{"name":"22298","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22298"},{"name":"22352","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22352"},{"name":"22236","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22236"},{"name":"oval:org.mitre.oval:def:1193","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193"},{"name":"24799","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24799"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955"},{"name":"22091","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22091"},{"name":"SSRT061267","tags":["vendor-advisory","x_refsource_HP"],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"name":"22495","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22495"},{"name":"ADV-2007-1332","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/1332"},{"name":"20216","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/20216"},{"name":"20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/447153/100/0/threaded"},{"name":"GLSA-200609-17","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200609-17.xml"},{"name":"22823","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22823"},{"name":"FreeBSD-SA-06:22.openssh","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc"},{"name":"SSA:2006-272-02","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566"},{"name":"RHSA-2006:0697","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0697.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg"},{"name":"ADV-2006-3777","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/3777"},{"name":"OpenPKG-SA-2006.022","tags":["vendor-advisory","x_refsource_OPENPKG"],"url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html"},{"name":"22183","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22183"},{"name":"openssh-block-dos(29158)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29158"},{"name":"[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released","tags":["mailing-list","x_refsource_MLIST"],"url":"http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2"},{"name":"23241","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23241"},{"name":"ADV-2007-2119","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2119"},{"name":"ADV-2007-0930","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/0930"},{"name":"[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html"},{"name":"22926","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22926"},{"name":"29371","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29371"},{"name":"22208","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22208"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"},{"name":"22245","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22245"},{"name":"20061001-01-P","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-661"},{"name":"22196","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22196"},{"name":"DSA-1212","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1212"},{"name":"oval:org.mitre.oval:def:10462","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462"},{"name":"RHSA-2006:0698","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0698.html"},{"name":"29152","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/29152"},{"name":"25608","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25608"},{"name":"22158","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22158"},{"name":"MDKSA-2006:179","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:179"},{"name":"DSA-1189","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1189"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm"},{"name":"SCOSA-2008.2","tags":["vendor-advisory","x_refsource_SCO"],"url":"ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt"},{"name":"24479","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24479"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2006-4924","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"FreeBSD-SA-06:22","refsource":"FREEBSD","url":"http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc"},{"name":"http://sourceforge.net/forum/forum.php?forum_id=681763","refsource":"CONFIRM","url":"http://sourceforge.net/forum/forum.php?forum_id=681763"},{"name":"http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability","refsource":"CONFIRM","url":"http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability"},{"name":"22270","refsource":"SECUNIA","url":"http://secunia.com/advisories/22270"},{"name":"HPSBUX02178","refsource":"HP","url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"name":"23038","refsource":"SECUNIA","url":"http://secunia.com/advisories/23038"},{"name":"USN-355-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-355-1"},{"name":"2006-0054","refsource":"TRUSTIX","url":"http://www.trustix.org/errata/2006/0054"},{"name":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html","refsource":"CONFIRM","url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"},{"name":"ADV-2006-4401","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/4401"},{"name":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227","refsource":"CONFIRM","url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227"},{"name":"ADV-2009-0740","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0740"},{"name":"22116","refsource":"SECUNIA","url":"http://secunia.com/advisories/22116"},{"name":"21923","refsource":"SECUNIA","url":"http://secunia.com/advisories/21923"},{"name":"24805","refsource":"SECUNIA","url":"http://secunia.com/advisories/24805"},{"name":"23340","refsource":"SECUNIA","url":"http://secunia.com/advisories/23340"},{"name":"[2.9] 015: SECURITY FIX: October 12, 2006","refsource":"OPENBSD","url":"http://www.openbsd.org/errata.html#ssh"},{"name":"SUSE-SR:2006:024","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2006_24_sr.html"},{"name":"22487","refsource":"SECUNIA","url":"http://secunia.com/advisories/22487"},{"name":"TA07-072A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"name":"GLSA-200611-06","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200611-06.xml"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm"},{"name":"http://bugs.gentoo.org/show_bug.cgi?id=148228","refsource":"CONFIRM","url":"http://bugs.gentoo.org/show_bug.cgi?id=148228"},{"name":"22164","refsource":"SECUNIA","url":"http://secunia.com/advisories/22164"},{"name":"102962","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1"},{"name":"SUSE-SA:2006:062","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2006_62_openssh.html"},{"name":"22362","refsource":"SECUNIA","url":"http://secunia.com/advisories/22362"},{"name":"23680","refsource":"SECUNIA","url":"http://secunia.com/advisories/23680"},{"name":"APPLE-SA-2007-03-13","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"},{"name":"34274","refsource":"SECUNIA","url":"http://secunia.com/advisories/34274"},{"name":"VU#787448","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/787448"},{"name":"http://docs.info.apple.com/article.html?artnum=305214","refsource":"CONFIRM","url":"http://docs.info.apple.com/article.html?artnum=305214"},{"name":"1016931","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016931"},{"name":"ADV-2006-4869","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/4869"},{"name":"22298","refsource":"SECUNIA","url":"http://secunia.com/advisories/22298"},{"name":"22352","refsource":"SECUNIA","url":"http://secunia.com/advisories/22352"},{"name":"22236","refsource":"SECUNIA","url":"http://secunia.com/advisories/22236"},{"name":"oval:org.mitre.oval:def:1193","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193"},{"name":"24799","refsource":"SECUNIA","url":"http://secunia.com/advisories/24799"},{"name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955","refsource":"MISC","url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955"},{"name":"22091","refsource":"SECUNIA","url":"http://secunia.com/advisories/22091"},{"name":"SSRT061267","refsource":"HP","url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"name":"22495","refsource":"SECUNIA","url":"http://secunia.com/advisories/22495"},{"name":"ADV-2007-1332","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/1332"},{"name":"20216","refsource":"BID","url":"http://www.securityfocus.com/bid/20216"},{"name":"20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/447153/100/0/threaded"},{"name":"GLSA-200609-17","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200609-17.xml"},{"name":"22823","refsource":"SECUNIA","url":"http://secunia.com/advisories/22823"},{"name":"FreeBSD-SA-06:22.openssh","refsource":"FREEBSD","url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc"},{"name":"SSA:2006-272-02","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566"},{"name":"RHSA-2006:0697","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2006-0697.html"},{"name":"https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg","refsource":"CONFIRM","url":"https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg"},{"name":"ADV-2006-3777","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/3777"},{"name":"OpenPKG-SA-2006.022","refsource":"OPENPKG","url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html"},{"name":"22183","refsource":"SECUNIA","url":"http://secunia.com/advisories/22183"},{"name":"openssh-block-dos(29158)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29158"},{"name":"[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released","refsource":"MLIST","url":"http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2"},{"name":"23241","refsource":"SECUNIA","url":"http://secunia.com/advisories/23241"},{"name":"ADV-2007-2119","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2119"},{"name":"ADV-2007-0930","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/0930"},{"name":"[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability","refsource":"MLIST","url":"http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html"},{"name":"22926","refsource":"SECUNIA","url":"http://secunia.com/advisories/22926"},{"name":"29371","refsource":"SECUNIA","url":"http://secunia.com/advisories/29371"},{"name":"22208","refsource":"SECUNIA","url":"http://secunia.com/advisories/22208"},{"name":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html","refsource":"CONFIRM","url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"},{"name":"22245","refsource":"SECUNIA","url":"http://secunia.com/advisories/22245"},{"name":"20061001-01-P","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"},{"name":"https://issues.rpath.com/browse/RPL-661","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-661"},{"name":"22196","refsource":"SECUNIA","url":"http://secunia.com/advisories/22196"},{"name":"DSA-1212","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-1212"},{"name":"oval:org.mitre.oval:def:10462","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462"},{"name":"RHSA-2006:0698","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2006-0698.html"},{"name":"29152","refsource":"OSVDB","url":"http://www.osvdb.org/29152"},{"name":"25608","refsource":"SECUNIA","url":"http://secunia.com/advisories/25608"},{"name":"22158","refsource":"SECUNIA","url":"http://secunia.com/advisories/22158"},{"name":"MDKSA-2006:179","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:179"},{"name":"DSA-1189","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-1189"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm"},{"name":"SCOSA-2008.2","refsource":"SCO","url":"ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt"},{"name":"24479","refsource":"SECUNIA","url":"http://secunia.com/advisories/24479"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T19:32:22.366Z"},"title":"CVE Program Container","references":[{"name":"FreeBSD-SA-06:22","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://sourceforge.net/forum/forum.php?forum_id=681763"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability"},{"name":"22270","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22270"},{"name":"HPSBUX02178","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"name":"23038","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23038"},{"name":"USN-355-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-355-1"},{"name":"2006-0054","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2006/0054"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"},{"name":"ADV-2006-4401","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4401"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227"},{"name":"ADV-2009-0740","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0740"},{"name":"22116","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22116"},{"name":"21923","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21923"},{"name":"24805","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24805"},{"name":"23340","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23340"},{"name":"[2.9] 015: SECURITY FIX: October 12, 2006","tags":["vendor-advisory","x_refsource_OPENBSD","x_transferred"],"url":"http://www.openbsd.org/errata.html#ssh"},{"name":"SUSE-SR:2006:024","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2006_24_sr.html"},{"name":"22487","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22487"},{"name":"TA07-072A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"name":"GLSA-200611-06","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200611-06.xml"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://bugs.gentoo.org/show_bug.cgi?id=148228"},{"name":"22164","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22164"},{"name":"102962","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1"},{"name":"SUSE-SA:2006:062","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2006_62_openssh.html"},{"name":"22362","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22362"},{"name":"23680","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23680"},{"name":"APPLE-SA-2007-03-13","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"},{"name":"34274","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/34274"},{"name":"VU#787448","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/787448"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://docs.info.apple.com/article.html?artnum=305214"},{"name":"1016931","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016931"},{"name":"ADV-2006-4869","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4869"},{"name":"22298","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22298"},{"name":"22352","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22352"},{"name":"22236","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22236"},{"name":"oval:org.mitre.oval:def:1193","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193"},{"name":"24799","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24799"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955"},{"name":"22091","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22091"},{"name":"SSRT061267","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112"},{"name":"22495","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22495"},{"name":"ADV-2007-1332","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/1332"},{"name":"20216","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/20216"},{"name":"20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/447153/100/0/threaded"},{"name":"GLSA-200609-17","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200609-17.xml"},{"name":"22823","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22823"},{"name":"FreeBSD-SA-06:22.openssh","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc"},{"name":"SSA:2006-272-02","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566"},{"name":"RHSA-2006:0697","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0697.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg"},{"name":"ADV-2006-3777","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/3777"},{"name":"OpenPKG-SA-2006.022","tags":["vendor-advisory","x_refsource_OPENPKG","x_transferred"],"url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html"},{"name":"22183","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22183"},{"name":"openssh-block-dos(29158)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29158"},{"name":"[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2"},{"name":"23241","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23241"},{"name":"ADV-2007-2119","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2119"},{"name":"ADV-2007-0930","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/0930"},{"name":"[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html"},{"name":"22926","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22926"},{"name":"29371","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29371"},{"name":"22208","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22208"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"},{"name":"22245","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22245"},{"name":"20061001-01-P","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-661"},{"name":"22196","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22196"},{"name":"DSA-1212","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1212"},{"name":"oval:org.mitre.oval:def:10462","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462"},{"name":"RHSA-2006:0698","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0698.html"},{"name":"29152","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/29152"},{"name":"25608","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25608"},{"name":"22158","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22158"},{"name":"MDKSA-2006:179","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:179"},{"name":"DSA-1189","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1189"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm"},{"name":"SCOSA-2008.2","tags":["vendor-advisory","x_refsource_SCO","x_transferred"],"url":"ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt"},{"name":"24479","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24479"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-4924","datePublished":"2006-09-27T01:00:00.000Z","dateReserved":"2006-09-21T00:00:00.000Z","dateUpdated":"2024-08-07T19:32:22.366Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}