Check Point Reference: | CPAI-2013-3512 |
Date Published: | 28 Jan 2014 |
Severity: | Critical |
Last Updated: | Wednesday 22 January, 2025 |
Source: | CVE-2010-5107 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | OpenSSH OpenSSH 6.1 and prior |
Vulnerability Description | A denial of service vulnerability exists in the OpenSSH server daemon (sshd). The vulnerability is due to a default configuration that only allows a small number of unauthenticated connections, after which the server will stop accepting any new connections. A remote unauthenticated attacker can exploit this vulnerability by creating a large number of connections to the SSH server, consuming all available connection slots. Repeated exploitation could result in a denial of service condition. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: SSH Protection Violation
Attack Information: OpenSSH maxstartup Threshold Connection Exhaustion denial of service