CVE-2006-0883

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-0883
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-0883.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-0883
Downstream
Published
2006-03-07T02:02:00Z
Modified
2025-08-09T19:01:27Z
Summary
[none]
Details

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

References

Affected packages