Category
Security
Release Phase
Resolved
Bug Id
6868716
Date of Resolved Release23-Nov-2009
A security vulnerability in the timeout mechanism of Solaris sshd(1M):
1. Impact
A security vulnerability in the timeout mechanism of Solaris
sshd(1M) may allow a remote unprivileged user to cause a Denial of Service (DoS) condition. If this issue is exploited, the sshd(1M) daemon will stop accepting new
ssh(1) connections.
2. Contributing Factors
This issue can occur in the following releases:
SPARC Platform
x86 Platform
Notes:
1. Solaris 8 and 9 are not impacted by this issue.
2. This issue only affects systems which are configured to run the
SSH service.
The following command can be used to determine if the sshd(1M) daemon
is running on a host:
$ pgrep sshd || echo "sshd not running"
3. Symptoms
When the described issue occurs, sshd(1M) on the affected host stops
accepting new connections and users attempting to connect remotely may see the
following message:
ssh_exchange_identification: Connection closed by remote host
4. Workaround
There is no workaround for this issue. Please see the Resolution
section below.
5. Resolution
This issue is addressed in the following releases:
SPARC Platform
- Solaris 10 with patch 143140-01 or later
- OpenSolaris based upon builds snv_124 or later
x86 Platform
- Solaris 10 5/09 (or later) with patch
141525-06 or later
- OpenSolaris based upon builds snv_124 or later
For more information on Security Sun Alerts, see
Modification History
17-Dec-2009: Updated Contributing Factors section.
Product
Solaris 10 Operating System
OpenSolaris
References
143140-01
141525-06
References
SUNPATCH:141525-06
SUNPATCH:143140-01
AttachmentsThis solution has no attachment