CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2010-5107 CentOS Security Update for openssh (CESA-2013:1591)

2017年6月27日 2541点热度 0人点赞 0条评论

漏洞类别:CentOS

漏洞等级:

漏洞信息

OpenSSH is OpenBSD's Secure Shell (SSH) protocol implementation.

The default OpenSSH configuration made it easy for remote attackers to exhaust unauthorized connection slots and prevent other users from logging in to a system. This flaw has been addressed by enabling random early connection drops by setting MaxStartups to 10:30:100 by default.

All OpenSSH users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.

漏洞危害

This vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory CESA-2013:1591for updates and patch information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

CESA-2013:1591

0daybank

标签: 暂无
最后更新:2017年8月4日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me