OpenSSH Default Configuration Denial of Service Vulnerability

OpenSSH Default Configuration Denial of Service Vulnerability

CVE-2010-5107 · MEDIUM Severity

AV:N/AC:L/AU:N/C:N/I:N/A:P

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

Learn more about our Web Application Penetration Testing UK.