Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.25%
  • Veröffentlicht 06.12.2010 22:30:31
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending c...

  • EPSS 0.04%
  • Veröffentlicht 01.10.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use config...

  • EPSS 3.47%
  • Veröffentlicht 19.11.2008 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server f...

  • EPSS 1.59%
  • Veröffentlicht 18.09.2008 15:04:27
  • Zuletzt bearbeitet 09.04.2025 00:30:58

A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attac...

  • EPSS 2.27%
  • Veröffentlicht 27.08.2008 20:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact....

  • EPSS 0.02%
  • Veröffentlicht 22.07.2008 16:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the ...

Exploit
  • EPSS 2.87%
  • Veröffentlicht 18.07.2008 16:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.

  • EPSS 0.2%
  • Veröffentlicht 02.04.2008 18:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.

  • EPSS 0.14%
  • Veröffentlicht 24.03.2008 23:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and ...

  • EPSS 2.4%
  • Veröffentlicht 18.10.2007 20:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of the...