Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.86%
  • Veröffentlicht 18.06.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.

  • EPSS 2.66%
  • Veröffentlicht 15.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.

  • EPSS 1.05%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.

  • EPSS 0.32%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which al...

  • EPSS 0.21%
  • Veröffentlicht 21.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.

  • EPSS 0.28%
  • Veröffentlicht 06.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.

  • EPSS 3.14%
  • Veröffentlicht 18.10.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP add...

  • EPSS 0.56%
  • Veröffentlicht 27.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 20.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying al...

Exploit
  • EPSS 24.51%
  • Veröffentlicht 22.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies...