Overview
OpenSSH fails to properly handle multiple identical blocks in a SSH packet. This vulnerability may cause a denial-of-service condition.
Description
OpenSSH is an open source client and server implementation of the Secure Shell (SSH) protocol. OpenSSH includes a cyclic redundancy check (CRC) compensation attack detection function that produces a checksum on a block of data in a SSH packet. This function was introduced to defend against exploitation of CRC weaknesses in version 1 of the SSH protocol (see VU#13877). Multiple identical blocks contained within a SSH packet may trigger a computationally expensive operation within the CRC attack detector that can lead to a denial of service. According to the OpenSSH 4.4 release notes: [This vulnerability]...would cause sshd(8) to spin until the login grace time expired. |
Impact
A remote, unauthenticated attacker could cause a denial-of service condition by sending specially crafted packets to the OpenSSH server that would cause it to use excessive CPU time until a connection timeout occurs. |
Solution
Upgrade |
Disable SSH version 1
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115939141729160&w=2
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
- http://secunia.com/advisories/22091
- http://www.securityfocus.com/bid/20216
- http://www.openssh.com/txt/release-4.4
- https://issues.rpath.com/browse/RPL-661
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
- http://secunia.com/advisories/22208/
- http://secunia.com/advisories/22236/
- http://secunia.com/advisories/22183/
- http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
- http://secunia.com/advisories/22362/
- http://secunia.com/advisories/22495/
- http://secunia.com/advisories/23241/
- http://docs.info.apple.com/article.html?artnum=305214
Acknowledgements
This issue was reported in the OpenSSH 4.4 release notes. OpenSSH credits Tavis Ormandy of the Google Security Team for reporting this issue.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2006-4924 |
Severity Metric: | 8.82 |
Date Public: | 2006-09-27 |
Date First Published: | 2006-10-04 |
Date Last Updated: | 2007-03-13 22:01 UTC |
Document Revision: | 45 |