Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.6%
  • Veröffentlicht 18.12.2023 19:15:08
  • Zuletzt bearbeitet 21.11.2024 08:37:59

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodul...

Medienbericht Exploit
  • EPSS 64.06%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

Exploit
  • EPSS 66.18%
  • Veröffentlicht 20.07.2023 03:15:10
  • Zuletzt bearbeitet 21.11.2024 08:13:30

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading ...

  • EPSS 0.21%
  • Veröffentlicht 17.03.2023 04:15:14
  • Zuletzt bearbeitet 21.11.2024 07:55:17

ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.

Exploit
  • EPSS 90.54%
  • Veröffentlicht 03.02.2023 06:15:09
  • Zuletzt bearbeitet 21.11.2024 07:49:10

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to an...

  • EPSS 0.4%
  • Veröffentlicht 13.03.2022 00:15:07
  • Zuletzt bearbeitet 21.11.2024 06:13:36

An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the u...

  • EPSS 0.37%
  • Veröffentlicht 26.09.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:26:32

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsC...

Exploit
  • EPSS 19.5%
  • Veröffentlicht 15.09.2021 20:15:07
  • Zuletzt bearbeitet 21.11.2024 02:47:33

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combi...

  • EPSS 0.26%
  • Veröffentlicht 05.03.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:59:01

ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.

Exploit
  • EPSS 61.48%
  • Veröffentlicht 24.07.2020 14:15:12
  • Zuletzt bearbeitet 28.07.2025 18:12:45

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous arg...