Description
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- high
- Privileges
- none
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-364CWE-362
Metadata
- Primary Vendor
- SONICWALL
- Published
- 7/1/2024
- Last Modified
- 9/30/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
sonicwall : sma_6200_firmwaresonicwall : sma_7200_firmwarearista : eoscanonical : ubuntu_linuxcanonical : ubuntu_linuxalmalinux : almalinuxsonicwall : sma_6210_firmwaresonicwall : sma_7210_firmwaresonicwall : sma_8200v_firmwaresonicwall : sra_ex_7000_firmwarenetapp : a1k_firmwarenetapp : a70_firmwarenetapp : a90_firmwarenetapp : a700s_firmwarenetapp : 8300_firmwarenetapp : 8700_firmwarenetapp : a400_firmwarenetapp : c400_firmwarenetapp : a250_firmwarenetapp : 500f_firmwarenetapp : c250_firmwarenetapp : a800_firmwarenetapp : c800_firmwarenetapp : a900_firmwarenetapp : a9500_firmwarenetapp : c190_firmwarenetapp : a150_firmwarenetapp : a220_firmwarenetapp : fas2720_firmwarenetapp : fas2750_firmwarenetapp : fas2820_firmwarenetapp : bootstrap_osapple : macosapple : macosapple : macosopenbsd : opensshopenbsd : opensshopenbsd : opensshopenbsd : opensshopenbsd : opensshredhat : openshift_container_platformredhat : enterprise_linuxredhat : enterprise_linux_eusredhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_server_aussuse : linux_enterprise_microdebian : debian_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxamazon : amazon_linuxnetapp : active_iq_unified_managernetapp : e-series_santricity_os_controllernetapp : ontapnetapp : ontap_select_deploy_administration_utilitynetapp : ontap_toolsnetapp : ontap_toolsfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdnetbsd : netbsd
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.