High severity8.1NVD Advisory· Published Sep 27, 2006· Updated Apr 23, 2026
CVE-2006-5051
CVE-2006-5051
Description
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Affected products
4- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
58- secunia.com/advisories/22158nvdBroken LinkVendor Advisory
- secunia.com/advisories/22173nvdBroken LinkVendor Advisory
- secunia.com/advisories/22183nvdBroken LinkVendor Advisory
- secunia.com/advisories/22196nvdBroken LinkVendor Advisory
- secunia.com/advisories/22208nvdBroken LinkVendor Advisory
- secunia.com/advisories/22236nvdBroken LinkVendor Advisory
- secunia.com/advisories/22245nvdBroken LinkVendor Advisory
- secunia.com/advisories/22270nvdBroken LinkVendor Advisory
- secunia.com/advisories/22352nvdBroken LinkVendor Advisory
- secunia.com/advisories/22362nvdBroken LinkVendor Advisory
- secunia.com/advisories/22487nvdBroken LinkVendor Advisory
- secunia.com/advisories/22823nvdBroken LinkVendor Advisory
- secunia.com/advisories/22926nvdBroken LinkVendor Advisory
- secunia.com/advisories/23680nvdBroken LinkVendor Advisory
- secunia.com/advisories/24479nvdBroken LinkVendor Advisory
- secunia.com/advisories/24799nvdBroken LinkVendor Advisory
- secunia.com/advisories/24805nvdBroken LinkVendor Advisory
- security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.ascnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200611-06.xmlnvdThird Party Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- support.avaya.com/elmodocs2/security/ASA-2006-216.htmnvdThird Party Advisory
- www.kb.cert.org/vuls/id/851340nvdThird Party AdvisoryUS Government Resource
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.securityfocus.com/bid/20241nvdBroken LinkThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA07-072A.htmlnvdThird Party AdvisoryUS Government Resource
- exchange.xforce.ibmcloud.com/vulnerabilities/29254nvdThird Party AdvisoryVDB Entry
- ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.ascnvdBroken Link
- patches.sgi.com/support/free/security/advisories/20061001-01-P.ascnvdBroken Link
- docs.info.apple.com/article.htmlnvdBroken Link
- lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlnvdMailing List
- lists.freebsd.org/pipermail/freebsd-security/2006-October/004051.htmlnvdMailing List
- marc.infonvdMailing List
- openssh.org/txt/release-4.4nvdRelease Notes
- secunia.com/advisories/22495nvdBroken Link
- slackware.com/security/viewer.phpnvdBroken Link
- sourceforge.net/forum/forum.phpnvdBroken Link
- www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.htmlnvdBroken Link
- www.arkoon.fr/upload/alertes/36AK-2006-07-FR-1.0_FAST360_OPENSSH.pdfnvdBroken Link
- www.arkoon.fr/upload/alertes/43AK-2006-09-FR-1.0_SSL360_OPENSSH.pdfnvdBroken Link
- www.debian.org/security/2006/dsa-1189nvdMailing List
- www.debian.org/security/2006/dsa-1212nvdBroken Link
- www.novell.com/linux/security/advisories/2006_62_openssh.htmlnvdBroken Link
- www.openbsd.org/errata.htmlnvdRelease Notes
- www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.htmlnvdBroken Link
- www.osvdb.org/29264nvdBroken Link
- www.redhat.com/support/errata/RHSA-2006-0697.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2006-0698.htmlnvdBroken Link
- www.ubuntu.com/usn/usn-355-1nvdBroken Link
- www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlnvdBroken Link
- www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlnvdBroken Link
- www.vupen.com/english/advisories/2006/4018nvdBroken Link
- www.vupen.com/english/advisories/2006/4329nvdBroken Link
- www.vupen.com/english/advisories/2007/0930nvdBroken Link
- www.vupen.com/english/advisories/2007/1332nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11387nvdBroken Link
- www.openwall.com/lists/oss-security/2024/07/01/3nvd
- www.openwall.com/lists/oss-security/2024/07/28/3nvd
- www.openwall.com/lists/oss-security/2024/07/28/3nvd
News mentions
0No linked articles in our index yet.