DenyHosts 2.5 does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address, which is not properly handled by a regular expression.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=157163 - Exploit | |
References | () http://secunia.com/advisories/23236 - Vendor Advisory | |
References | () http://secunia.com/advisories/23603 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200701-01.xml - | |
References | () http://www.securityfocus.com/bid/21468 - | |
References | () http://www.vupen.com/english/advisories/2006/4876 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30761 - |
Information
Published : 2006-12-06 19:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6301
Mitre link : CVE-2006-6301
CVE.ORG link : CVE-2006-6301
JSON object : View
Products Affected
denyhosts
- denyhosts
CWE