CVE-2010-4755

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.

References

http://cvsweb.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sftp.c#rev1.21.6.1

http://cvsweb.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sftp-glob.c#rev1.13.12.1

http://cxib.net/stuff/glob-0day.c

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2010-008.txt.asc

http://securityreason.com/achievement_securityalert/89

http://securityreason.com/exploitalert/9223

http://securityreason.com/securityalert/8116

Details

Source: MITRE

Published: 2011-03-02

Updated: 2014-08-08

Type: CWE-399

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8

Severity: MEDIUM

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:freebsd:freebsd:7.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.1:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.0.2:*:*:*:*:*:*:*

cpe:2.3:o:openbsd:openbsd:4.7:*:*:*:*:*:*:*

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
701162OpenSSH < 5.9 Multiple DoSNessus Network MonitorSSH
medium
127415NewStart CGSL MAIN 4.05 : openssh-latest Multiple Vulnerabilities (NS-SA-2019-0146)NessusNewStart CGSL Local Security Checks
high
127206NewStart CGSL CORE 5.04 / MAIN 5.04 : openssh Multiple Vulnerabilities (NS-SA-2019-0036)NessusNewStart CGSL Local Security Checks
high
73958GLSA-201405-06 : OpenSSH: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
17703OpenSSH < 5.9 Multiple DoSNessusDenial of Service
medium