CVE-2010-5107
Publication date 7 March 2013
Last updated 24 July 2024
Ubuntu priority
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssh | 16.04 LTS xenial |
Not affected
|
14.04 LTS trusty |
Not affected
|
|
Notes
jdstrand
this is a long-standing problem with any server that limits connections. This requires conffile changes.
mdeslaur
Upstream has changed the default MaxStartups to 10:30:100 to mitigate this issue. Sysadmins can change the equivalent config locally. we will not be fixing this issue in Ubuntu 12.04 LTS, in environments where this is a concern, we suggest settings the MaxStartups value to 10:30:100 in the sshd_config file
Patch details
Package | Patch details |
---|---|
openssh |