{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2008-4109","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-07T10:00:42.727Z","dateReserved":"2008-09-16T00:00:00.000Z","datePublished":"2008-09-17T18:06:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-07-01T10:06:08.789Z"},"descriptions":[{"lang":"en","value":"A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"USN-649-1","tags":["vendor-advisory"],"url":"http://www.ubuntu.com/usn/usn-649-1"},{"name":"openssh-signalhandler-dos(45202)","tags":["vdb-entry"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45202"},{"name":"31885","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/31885"},{"name":"1020891","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id?1020891"},{"name":"DSA-1638","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2008/dsa-1638"},{"name":"SUSE-SR:2008:020","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html"},{"name":"32080","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/32080"},{"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498678"},{"name":"32181","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/32181"},{"name":"[oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/07/01/3"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2008-09-16T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-24T17:46:27.119928Z","id":"CVE-2008-4109","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-24T17:46:34.087Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T10:00:42.727Z"},"title":"CVE Program Container","references":[{"name":"USN-649-1","tags":["vendor-advisory","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-649-1"},{"name":"openssh-signalhandler-dos(45202)","tags":["vdb-entry","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45202"},{"name":"31885","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/31885"},{"name":"1020891","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id?1020891"},{"name":"DSA-1638","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2008/dsa-1638"},{"name":"SUSE-SR:2008:020","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html"},{"name":"32080","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/32080"},{"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498678","tags":["x_transferred"]},{"name":"32181","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/32181"},{"name":"[oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/01/3"}]}]},"dataVersion":"5.1"}