ksh on Tru64 systems has been reported prone to a denial of service vulnerability. Under some circumstances, ksh does not sufficiently terminate if a telnet session is aborted abruptly. The ksh process will continue to execute consuming CPU resources in an exponential manner until the CPU becomes resource-bound. A malicious user may exploit this issue to trigger a denial of service for legitimate users of the affected system.
ksh on Tru64 systems has been reported prone to a denial of service vulnerability. Under some circumstances, ksh does not sufficiently terminate if a telnet session is aborted abruptly. The ksh process will continue to execute consuming CPU resources in an exponential manner until the CPU becomes resource-bound. A malicious user may exploit this issue to trigger a denial of service for legitimate users of the affected system.