Search for vulnerabilities
Vulnerability details: VCID-sj5t-6hea-aaab
Vulnerability ID VCID-sj5t-6hea-aaab
Aliases CVE-2006-5051
Summary Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Status Published
Exploitability 2.0
Weighted Severity 8.4
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2006:0697
rhas Important https://access.redhat.com/errata/RHSA-2006:0698
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01238 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.0143 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01458 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01908 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01908 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.01908 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.02244 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.02244 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.02344 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.86871 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.86871 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.86871 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
epss 0.92876 https://api.first.org/data/v1/epss?cve=CVE-2006-5051
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=208347
cvssv3.1 8.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2006-5051
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2006-5051
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2006-5051
Reference id Reference type URL
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.freebsd.org/pipermail/freebsd-security/2006-October/004051.html
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
http://openssh.org/txt/release-4.4
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5051.json
https://api.first.org/data/v1/epss?cve=CVE-2006-5051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051
http://secunia.com/advisories/22158
http://secunia.com/advisories/22173
http://secunia.com/advisories/22183
http://secunia.com/advisories/22196
http://secunia.com/advisories/22208
http://secunia.com/advisories/22236
http://secunia.com/advisories/22245
http://secunia.com/advisories/22270
http://secunia.com/advisories/22352
http://secunia.com/advisories/22362
http://secunia.com/advisories/22487
http://secunia.com/advisories/22495
http://secunia.com/advisories/22823
http://secunia.com/advisories/22926
http://secunia.com/advisories/23680
http://secunia.com/advisories/24479
http://secunia.com/advisories/24799
http://secunia.com/advisories/24805
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
http://security.gentoo.org/glsa/glsa-200611-06.xml
http://securitytracker.com/id?1016940
https://exchange.xforce.ibmcloud.com/vulnerabilities/29254
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
http://sourceforge.net/forum/forum.php?forum_id=681763
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11387
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
https://www.openwall.com/lists/oss-security/2024/07/28/3
http://www.arkoon.fr/upload/alertes/36AK-2006-07-FR-1.0_FAST360_OPENSSH.pdf
http://www.arkoon.fr/upload/alertes/43AK-2006-09-FR-1.0_SSL360_OPENSSH.pdf
http://www.debian.org/security/2006/dsa-1189
http://www.debian.org/security/2006/dsa-1212
http://www.kb.cert.org/vuls/id/851340
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
http://www.openbsd.org/errata.html#ssh
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
http://www.openwall.com/lists/oss-security/2024/07/01/3
http://www.openwall.com/lists/oss-security/2024/07/28/3
http://www.osvdb.org/29264
http://www.redhat.com/support/errata/RHSA-2006-0697.html
http://www.redhat.com/support/errata/RHSA-2006-0698.html
http://www.securityfocus.com/bid/20241
http://www.ubuntu.com/usn/usn-355-1
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
http://www.vupen.com/english/advisories/2006/4018
http://www.vupen.com/english/advisories/2006/4329
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1332
208347 https://bugzilla.redhat.com/show_bug.cgi?id=208347
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
CVE-2006-5051 https://nvd.nist.gov/vuln/detail/CVE-2006-5051
GLSA-200611-06 https://security.gentoo.org/glsa/200611-06
RHSA-2006:0697 https://access.redhat.com/errata/RHSA-2006:0697
RHSA-2006:0698 https://access.redhat.com/errata/RHSA-2006:0698
USN-355-1 https://usn.ubuntu.com/355-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2006-5051
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2006-5051
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2006-5051
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.77394
EPSS Score 0.01238
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.