Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 06.10.2025 00:00:00
  • Zuletzt bearbeitet 06.10.2025 19:15:36

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence exp...

  • EPSS 0.01%
  • Veröffentlicht 06.10.2025 00:00:00
  • Zuletzt bearbeitet 06.10.2025 19:15:36

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

  • EPSS 0.03%
  • Veröffentlicht 10.04.2025 00:00:00
  • Zuletzt bearbeitet 22.05.2025 16:51:54

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.

  • EPSS 46.32%
  • Veröffentlicht 28.02.2025 22:15:40
  • Zuletzt bearbeitet 27.05.2025 16:15:31

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious cli...

Medienbericht
  • EPSS 58.35%
  • Veröffentlicht 18.02.2025 19:15:29
  • Zuletzt bearbeitet 26.09.2025 07:15:41

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in spec...

  • EPSS 78.16%
  • Veröffentlicht 08.07.2024 18:15:09
  • Zuletzt bearbeitet 21.11.2024 09:49:35

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handl...

  • EPSS 1.71%
  • Veröffentlicht 02.07.2024 18:15:03
  • Zuletzt bearbeitet 29.01.2025 22:15:29

OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.

Medienbericht Exploit
  • EPSS 38.58%
  • Veröffentlicht 01.07.2024 13:15:06
  • Zuletzt bearbeitet 30.09.2025 13:52:23

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...

  • EPSS 0.01%
  • Veröffentlicht 24.12.2023 07:15:07
  • Zuletzt bearbeitet 22.09.2025 17:16:06

OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable ...

  • EPSS 0.04%
  • Veröffentlicht 18.12.2023 19:15:08
  • Zuletzt bearbeitet 21.11.2024 08:37:59

In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a...