{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T00:12:02.849","vulnerabilities":[{"cve":{"id":"CVE-2006-5052","sourceIdentifier":"secalert@redhat.com","published":"2006-09-27T23:07:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI \"authentication abort.\""},{"lang":"es","value":"Vulnerabilidad no especificada en OpenSSH portable anterior a 4.4, cuando funciona sobre algunas plataformas permite a un atacante remoto determinan la validación de los nombres de usuario a través de vectores desconocidos afectando a GSSAPI \"aborto de validacion.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","matchCriteriaId":"316C8534-9CE3-456C-A04E-5D2B789FBE31"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"7BEB67BB-A442-46C2-8BC1-BBEB009AC532"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"B6E307F1-C765-409C-835C-133026A5179C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","matchCriteriaId":"CA997F5E-29FE-454A-9006-001D732CD4B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"114134F3-BDFD-465D-8317-82F9D6EFA5A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","matchCriteriaId":"EED5E506-9D2B-4CAF-8455-B9BE7696E49C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"EE7CB94E-0479-4939-86F6-0B4BEDE2E739"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","matchCriteriaId":"78135400-BA1A-42AA-BE17-5588442BCF11"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","matchCriteriaId":"78F2EDC0-3189-4523-882B-9188C852F793"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","matchCriteriaId":"E2991C07-5486-4590-A74E-46A379DD3339"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EB9BE06-0A36-4853-ADF4-9C1A1854278A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","matchCriteriaId":"8FC57F38-6545-497B-B6DA-FCAF51755988"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","matchCriteriaId":"EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","matchCriteriaId":"EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","matchCriteriaId":"80C55B73-497D-4A22-9230-A4160BF97344"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","matchCriteriaId":"0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","matchCriteriaId":"4B235167-9554-4431-88C5-9472DD36FCDE"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","matchCriteriaId":"580008AC-2667-4708-8F7E-D70416A460EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"E05D8E86-EC01-4589-B372-4DEB7845C81F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","matchCriteriaId":"764AD252-CA2F-4A87-BCAA-7747E8C410E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","matchCriteriaId":"269BB9F7-55E5-4CB3-8429-C37C7132799F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","matchCriteriaId":"C6E6F639-31A0-4026-B6D4-51BA79FB1D20"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","matchCriteriaId":"0211BCE3-0DED-40BA-8A21-1A97B91F71C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","matchCriteriaId":"B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","matchCriteriaId":"5AD7BB30-AC79-4153-852C-1053DCF4DE53"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","matchCriteriaId":"F48519C6-0C28-49A5-94C7-EF3AA88E2667"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","matchCriteriaId":"9E188C66-C8F1-4C13-AAFF-7C83B2A884B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","matchCriteriaId":"9039BE91-AF0A-41E7-8F9F-15375890E120"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","matchCriteriaId":"08BCB2EA-DF9D-4853-805B-29FA6274E2B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","matchCriteriaId":"0F93417F-2498-4576-9F5D-B59F77D39669"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","matchCriteriaId":"AF3AB42C-B614-4746-99AD-E94140D91BF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","matchCriteriaId":"458167E5-9BC2-40BE-AC8A-9761A4F19494"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","matchCriteriaId":"3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","matchCriteriaId":"86ACA0ED-A3D0-48A7-B06F-13709AD23B55"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","matchCriteriaId":"0FEB9262-D05E-4610-9C79-3EDE44AC7C0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","matchCriteriaId":"8176879B-1875-4AC9-B15A-2ABCFCD04F88"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","matchCriteriaId":"FAA26A12-F96A-4025-BBCA-72B7A3B1E60C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","matchCriteriaId":"A02751E9-2D38-4495-9572-8D84D71D4773"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","matchCriteriaId":"7A36BEA2-DAE4-423C-8D85-0F6036351F98"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","matchCriteriaId":"80DC64F6-FE28-44BA-91D1-EC2DB11B2CFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","matchCriteriaId":"DF23EBA1-D3A9-413F-9E83-43A91492C031"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","matchCriteriaId":"44CCF5CD-B434-4392-A79A-C1945D2AE30A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","matchCriteriaId":"AEB456B8-9D8B-4985-858D-6A43FA5EE2E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","matchCriteriaId":"2BD4E0F6-4EEA-4EC7-83E7-FC6F7D2E7A3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","matchCriteriaId":"C35F4ABE-1B0C-4195-8F99-BF993A17882B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","matchCriteriaId":"ADC7352D-2916-47F7-A256-F897D763DC9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","matchCriteriaId":"AEC3FC36-B246-4DCB-8984-228525D9A356"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","matchCriteriaId":"BC861000-37D8-4B0F-BFA0-57E9BE125B56"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E003AB3C-8DF3-4AE8-82A3-984F30E5599B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","matchCriteriaId":"5EBE75FE-DDE2-43BA-80EF-15A6698EABC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","matchCriteriaId":"683B26F0-5EA2-455A-8948-27C100BBA3AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","matchCriteriaId":"E5A75B23-2DD7-4EB2-BEAA-049FF4E51A14"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","matchCriteriaId":"7279E1EC-DEBC-4ACC-925D-06A7697C162F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","matchCriteriaId":"7910598E-BEC1-4644-9DE4-D8BE505A4F9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","matchCriteriaId":"FB416D0C-6C86-450F-8917-D4B1BD82AB1E"}]}]}],"references":[{"url":"http://docs.info.apple.com/article.html?artnum=305214","source":"secalert@redhat.com"},{"url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html","source":"secalert@redhat.com"},{"url":"http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2","source":"secalert@redhat.com"},{"url":"http://openssh.org/txt/release-4.4","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2006-0697.html","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://secunia.com/advisories/22158","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/22173","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/22495","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/22823","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/24479","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/27588","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/28320","source":"secalert@redhat.com"},{"url":"http://security.gentoo.org/glsa/glsa-200611-06.xml","source":"secalert@redhat.com"},{"url":"http://securitytracker.com/id?1016939","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-527.htm","source":"secalert@redhat.com"},{"url":"http://www.novell.com/linux/security/advisories/2006_62_openssh.html","source":"secalert@redhat.com"},{"url":"http://www.osvdb.org/29266","source":"secalert@redhat.com"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0540.html","source":"secalert@redhat.com"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0703.html","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/archive/1/447861/100/200/threaded","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/bid/20245","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html","source":"secalert@redhat.com","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2007/0930","source":"secalert@redhat.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29255","source":"secalert@redhat.com"},{"url":"https://issues.rpath.com/browse/RPL-681","source":"secalert@redhat.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10178","source":"secalert@redhat.com"},{"url":"http://docs.info.apple.com/article.html?artnum=305214","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://openssh.org/txt/release-4.4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2006-0697.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/22158","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/22173","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/22495","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/22823","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/24479","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/27588","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/28320","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security.gentoo.org/glsa/glsa-200611-06.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1016939","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-527.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/2006_62_openssh.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/29266","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0540.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0703.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/447861/100/200/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/20245","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2007/0930","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29255","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://issues.rpath.com/browse/RPL-681","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10178","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Red Hat","comment":"This issue did not affect Red Hat Enterprise Linux 2.1 and 3.\n\nThis issue was addressed in Red Hat Enterprise Linux 4 and 5 via\nhttps://rhn.redhat.com/errata/RHSA-2007-0703.html and https://rhn.redhat.com/errata/RHSA-2007-0540.html respectively.","lastModified":"2009-09-24T00:00:00"}]}}]}