Mandrake Linux Security Advisory : openssh (MDKSA-2006:179)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.

Synopsis :

The remote Mandrake Linux host is missing one or more security

Description :

Tavis Ormandy of the Google Security Team discovered a Denial of
Service vulnerability in the SSH protocol version 1 CRC compensation
attack detector. This could allow a remote unauthenticated attacker to
trigger excessive CPU utilization by sending a specially crafted SSH
message, which would then deny ssh services to other users or
processes (CVE-2006-4924, CVE-2006-4925). Please note that Mandriva
ships with only SSH protocol version 2 enabled by default.

Next, an unsafe signal handler was found by Mark Dowd. This signal
handler was vulnerable to a race condition that could be exploited to
perform a pre-authentication DoS, and theoretically a
pre-authentication remote code execution in the case where some
authentication methods like GSSAPI are enabled (CVE-2006-5051).

Updated packages have been patched to correct this issue.

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 24565 (mandrake_MDKSA-2006-179.nasl)

Bugtraq ID: 20216

CVE ID: CVE-2006-4924

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now