CVE-2017-15906
- EPSS 2.76%
- Published 26.10.2017 03:29:00
- Last modified 20.04.2025 01:37:25
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-1908
- EPSS 2.54%
- Published 11.04.2017 18:59:00
- Last modified 20.04.2025 01:37:25
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding...
CVE-2016-6210
- EPSS 92.49%
- Published 13.02.2017 17:59:00
- Last modified 20.04.2025 01:37:25
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference be...
CVE-2016-10009
- EPSS 1.58%
- Published 05.01.2017 02:59:03
- Last modified 12.04.2025 10:46:40
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
- EPSS 0.08%
- Published 05.01.2017 02:59:03
- Last modified 12.04.2025 10:46:40
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10011
- EPSS 0.02%
- Published 05.01.2017 02:59:03
- Last modified 12.04.2025 10:46:40
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10012
- EPSS 0.02%
- Published 05.01.2017 02:59:03
- Last modified 12.04.2025 10:46:40
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a san...
CVE-2016-8858
- EPSS 51.1%
- Published 09.12.2016 11:59:00
- Last modified 12.04.2025 10:46:40
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does ...
CVE-2016-6515
- EPSS 84.42%
- Published 07.08.2016 21:59:09
- Last modified 12.04.2025 10:46:40
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
CVE-2015-8325
- EPSS 0.06%
- Published 01.05.2016 01:59:00
- Last modified 12.04.2025 10:46:40
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted...