Vulnerability Details CVE-2006-0883
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 82.1%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2006-0883
-
cpe:2.3:a:openbsd:openssh:3.8.1p1
-
cpe:2.3:o:freebsd:freebsd:5.3
-
cpe:2.3:o:freebsd:freebsd:5.4