Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.76%
  • Veröffentlicht 26.10.2017 03:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

  • EPSS 2.54%
  • Veröffentlicht 11.04.2017 18:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding...

  • EPSS 92.49%
  • Veröffentlicht 13.02.2017 17:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference be...

  • EPSS 1.58%
  • Veröffentlicht 05.01.2017 02:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.

  • EPSS 0.08%
  • Veröffentlicht 05.01.2017 02:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

  • EPSS 0.02%
  • Veröffentlicht 05.01.2017 02:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.

  • EPSS 0.02%
  • Veröffentlicht 05.01.2017 02:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a san...

  • EPSS 51.1%
  • Veröffentlicht 09.12.2016 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does ...

  • EPSS 84.42%
  • Veröffentlicht 07.08.2016 21:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.

  • EPSS 0.06%
  • Veröffentlicht 01.05.2016 01:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted...