CVE
- Id
- 21898
- CVE No.
- CVE-2006-5794
- Status
- Candidate
- Description
- Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
- Phase
- Assigned (20061108)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
210346 | 21898 | CVE-2006-5794 | BUGTRAQ:20061109 rPSA-2006-0207-1 openssh openssh-client openssh-server | View |
210347 | 21898 | CVE-2006-5794 | URL:http://www.securityfocus.com/archive/1/archive/1/451100/100/0/threaded | View |
210348 | 21898 | CVE-2006-5794 | CONFIRM:http://www.openssh.org/txt/release-4.5 | View |
210349 | 21898 | CVE-2006-5794 | CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=461854&group_id=69227 | View |
210350 | 21898 | CVE-2006-5794 | CONFIRM:https://issues.rpath.com/browse/RPL-766 | View |
210351 | 21898 | CVE-2006-5794 | CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227 | View |
210352 | 21898 | CVE-2006-5794 | CONFIRM:http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html | View |
210353 | 21898 | CVE-2006-5794 | CONFIRM:http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html | View |
210354 | 21898 | CVE-2006-5794 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2007-048.htm | View |
210355 | 21898 | CVE-2006-5794 | MANDRIVA:MDKSA-2006:204 | View |
210356 | 21898 | CVE-2006-5794 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:204 | View |
210357 | 21898 | CVE-2006-5794 | OPENPKG:OpenPKG-SA-2006.032 | View |
210358 | 21898 | CVE-2006-5794 | URL:http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.032-openssh.html | View |
210359 | 21898 | CVE-2006-5794 | REDHAT:RHSA-2006:0738 | View |
210360 | 21898 | CVE-2006-5794 | URL:http://rhn.redhat.com/errata/RHSA-2006-0738.html | View |
210361 | 21898 | CVE-2006-5794 | SGI:20061201-01-P | View |
210362 | 21898 | CVE-2006-5794 | URL:ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc | View |
210363 | 21898 | CVE-2006-5794 | SUSE:SUSE-SR:2006:026 | View |
210364 | 21898 | CVE-2006-5794 | URL:http://www.novell.com/linux/security/advisories/2006_26_sr.html | View |
210365 | 21898 | CVE-2006-5794 | BID:20956 | View |
210366 | 21898 | CVE-2006-5794 | URL:http://www.securityfocus.com/bid/20956 | View |
210367 | 21898 | CVE-2006-5794 | OVAL:oval:org.mitre.oval:def:11840 | View |
210368 | 21898 | CVE-2006-5794 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11840 | View |
210369 | 21898 | CVE-2006-5794 | VUPEN:ADV-2006-4399 | View |
210370 | 21898 | CVE-2006-5794 | URL:http://www.vupen.com/english/advisories/2006/4399 | View |
210371 | 21898 | CVE-2006-5794 | VUPEN:ADV-2006-4400 | View |
210372 | 21898 | CVE-2006-5794 | URL:http://www.vupen.com/english/advisories/2006/4400 | View |
210373 | 21898 | CVE-2006-5794 | SECTRACK:1017183 | View |
210374 | 21898 | CVE-2006-5794 | URL:http://securitytracker.com/id?1017183 | View |
210375 | 21898 | CVE-2006-5794 | SECUNIA:22771 | View |
210376 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22771 | View |
210377 | 21898 | CVE-2006-5794 | SECUNIA:22773 | View |
210378 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22773 | View |
210379 | 21898 | CVE-2006-5794 | SECUNIA:22778 | View |
210380 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22778 | View |
210381 | 21898 | CVE-2006-5794 | SECUNIA:22814 | View |
210382 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22814 | View |
210383 | 21898 | CVE-2006-5794 | SECUNIA:22772 | View |
210384 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22772 | View |
210385 | 21898 | CVE-2006-5794 | SECUNIA:22872 | View |
210386 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22872 | View |
210387 | 21898 | CVE-2006-5794 | SECUNIA:23513 | View |
210388 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/23513 | View |
210389 | 21898 | CVE-2006-5794 | SECUNIA:23680 | View |
210390 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/23680 | View |
210391 | 21898 | CVE-2006-5794 | SECUNIA:24055 | View |
210392 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/24055 | View |
210393 | 21898 | CVE-2006-5794 | SECUNIA:22932 | View |
210394 | 21898 | CVE-2006-5794 | URL:http://secunia.com/advisories/22932 | View |
210395 | 21898 | CVE-2006-5794 | XF:openssh-separation-verificaton-weakness(30120) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
61157 | JVNDB-2006-003423 | Soholaunch Pro Edition における PHP リモートファイルインクルージョンの脆弱性 | Soholaunch Pro Edition には、register_globals が有効になっている際、PHP リモートファイルインクルージョンの脆弱性が存在します。 | CVE-2006-5796 | 21898 | 7.5 | http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-003423.html | View |