Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-0132

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2008-0132
Last Modified 05 Sep 2008 05:34:17
Published 08 Jan 2008 06:46:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-0132

Summary

Pragma FortressSSH 5.0 Build 4 Revision 293 and earlier handles long input to sshd.exe by creating an error-message window and waiting for the administrator to click in this window before terminating the sshd.exe process, which allows remote attackers to cause a denial of service (connection slot exhaustion) via a flood of SSH connections with long data objects, as demonstrated by (1) a long list of keys and (2) a long username.

Vulnerable Systems

Application

  • Pragma Systems Fortressssh 5.0 Build 4 R 293


References

XF - fortressssh-sshd-dos(39354)

MISC - http://aluigi.org/poc/pragmassh.zip

MISC - http://aluigi.altervista.org/adv/pragmassh-adv.txt

BID - 27141

BUGTRAQ - 20080104 Some DoS in some telnet servers


Last Updated: 27 May 2016 10:46:40