Ask the Community
Groups
CVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2011-5000</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier,<br>when gssapi-with-mic authentication is enabled, allows remote authenticated<br>users to cause a denial of service (memory consumption) via a large value in a<br>certain length field. NOTE: there may be limited scenarios in which this issue<br>is relevant.<br><br>CVSS2 Base Score 3.5<br>Impact: Low </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Resolution:<br>This was fixed in samba-3.6.23-25.el6_7.x86_64 and later. <br>Apply Unitrends security update v10.29 from 07/27/2018 or later, containing samba-3.6.23-45.el6_9.x86_64</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2011-5000%250D%250Ahttp%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2011-5000">https://access.redhat.com/security/cve/cve-2011-5000 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000</a></li></ul> </article> </main>