Vulnerability & Exploit Database

Back to search

RHSA-2013:1591: openssh security, bug fix, and enhancement update

Severity CVSS Published Added Modified
5 (AV:N/AC:L/Au:N/C:N/I:N/A:P) March 07, 2013 November 21, 2013 July 04, 2017


OpenSSH is OpenBSD's Secure Shell (SSH) protocol implementation.These packages include the core files necessary for the OpenSSH clientand server.The default OpenSSH configuration made it easy for remote attackers toexhaust unauthorized connection slots and prevent other users from beingable to log in to a system. This flaw has been addressed by enabling randomearly connection drops by setting MaxStartups to 10:30:100 by default.For more information, refer to the sshd_config(5) man page. (CVE-2010-5107)These updated openssh packages include numerous bug fixes and enhancements.Space precludes documenting all of these changes in this advisory.Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes,linked to in the References, for information on the most significant ofthese changes.All openssh users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues and addthese enhancements.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities