CVE-2006-1206 Affecting dropbear package, versions <0.48-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.55% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-DROPBEAR-526061
  • published14 Mar 2006
  • disclosed14 Mar 2006

Introduced: 14 Mar 2006

CVE-2006-1206  (opens in a new tab)

How to fix?

Upgrade Debian:11 dropbear to version 0.48-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dropbear package and not the dropbear package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30.

CVSS Scores

version 3.1