Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-6890 | First vendor Publication | 2013-12-23 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
denyhosts 2.6 uses an incorrect regular expression when analyzing authentication logs, which allows remote attackers to cause a denial of service (incorrect block of IP addresses) via crafted login names. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6890 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-287 | Improper Authentication |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:21063 | |||
Oval ID: | oval:org.mitre.oval:def:21063 | ||
Title: | DSA-2826-1 deny hosts - Remote denial of ssh service | ||
Description: | Helmut Grohne discovered that deny hosts, a tool preventing SSH brute-force attacks, could be used to perform remote denial of service against the SSH daemon. Incorrectly specified regular expressions used to detect brute force attacks in authentication logs could be exploited by a malicious user to forge crafted login names in order to make deny hosts ban arbitrary IP addresses. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2826-1 CVE-2013-6890 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | denyhosts |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28977 | |||
Oval ID: | oval:org.mitre.oval:def:28977 | ||
Title: | DSA-2826-2 -- denyhosts -- remote denial of ssh service | ||
Description: | Helmut Grohne discovered that denyhosts, a tool preventing SSH brute-force attacks, could be used to perform remote denial of service against the SSH daemon. Incorrectly specified regular expressions used to detect brute force attacks in authentication logs could be exploited by a malicious user to forge crafted login names in order to make denyhosts ban arbitrary IP addresses. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2826-2 CVE-2013-6890 | Version: | 3 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | denyhosts |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 3 | |
Os | 1 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-06 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17067.nasl - Type : ACT_GATHER_INFO |
2015-01-06 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17081.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201406-23.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2826.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:37:55 |
|
2021-05-04 12:28:59 |
|
2021-04-22 01:35:09 |
|
2020-05-23 00:38:58 |
|
2016-04-26 23:56:09 |
|
2015-01-07 13:26:25 |
|
2014-06-27 13:26:14 |
|
2014-02-17 11:24:30 |
|
2013-12-24 21:20:24 |
|
2013-12-24 13:19:28 |
|