Skip to navigation

CVE Database

CVE-2011-5000

Impact: Low
Public: 2011-08-01
Bugzilla: 809938: CVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI

Details

The MITRE CVE dictionary describes this issue as:

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

Find out more about CVE-2011-5000 from the MITRE CVE dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score: 3.5
Base Metrics: AV:N/AC:M/Au:S/C:N/I:N/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: Single Instance
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (openssh) RHSA-2012:0884 June 19, 2012

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.