This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.
The remote SSH server is affected by multiple vulnerabilities.
According to its banner, the version of OpenSSH installed on the
remote host is affected by multiple vulnerabilities :
- A race condition exists that may allow an
unauthenticated, remote attacker to crash the service
or, on portable OpenSSH, possibly execute code on the
affected host. Note that successful exploitation
requires that GSSAPI authentication be enabled.
- A flaw exists that may allow an attacker to determine
the validity of usernames on some platforms. Note that
this issue requires that GSSAPI authentication be
- When SSH version 1 is used, an issue can be triggered
via an SSH packet that contains duplicate blocks that
could result in a loss of availability for the service.
- On Fedora Core 6 (and possibly other systems), an
unspecified vulnerability in the
linux_audit_record_event() function allows remote
attackers to inject incorrect information into
See also :
Upgrade to OpenSSH 4.4 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Nessus Plugin ID: 22466 ()
Bugtraq ID: 202162024120245
CVE ID: CVE-2006-4924CVE-2006-4925CVE-2006-5051CVE-2006-5052CVE-2006-5229CVE-2007-3102CVE-2008-4109
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.