CVE-2010-5107

Updated: 2024-11-23 05:51:59.753972

Description:

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 5
CVSS Version 3.x 0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 6 ELS openssh 5.3p1 0.0 Not Vulnerable 2022-04-26 04:03:30