- EPSS 76.4%
- Veröffentlicht 08.07.2024 18:15:09
- Zuletzt bearbeitet 15.04.2026 00:35:42
A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handl...
CVE-2024-39894
- EPSS 3.03%
- Veröffentlicht 02.07.2024 18:15:03
- Zuletzt bearbeitet 15.04.2026 00:35:42
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
CVE-2024-6387
- EPSS 48.42%
- Veröffentlicht 01.07.2024 13:15:06
- Zuletzt bearbeitet 12.05.2026 12:17:20
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
- EPSS 0.01%
- Veröffentlicht 24.12.2023 07:15:07
- Zuletzt bearbeitet 18.11.2025 22:15:43
OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable ...
CVE-2023-51384
- EPSS 0.03%
- Veröffentlicht 18.12.2023 19:15:08
- Zuletzt bearbeitet 12.05.2026 12:16:14
In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a...
CVE-2023-51385
- EPSS 17.23%
- Veröffentlicht 18.12.2023 19:15:08
- Zuletzt bearbeitet 12.05.2026 12:16:15
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodul...
CVE-2023-48795
- EPSS 50.71%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 12.05.2026 11:16:15
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...
CVE-2023-38408
- EPSS 67.24%
- Veröffentlicht 20.07.2023 03:15:10
- Zuletzt bearbeitet 21.11.2024 08:13:30
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading ...
CVE-2023-28531
- EPSS 0.39%
- Veröffentlicht 17.03.2023 04:15:14
- Zuletzt bearbeitet 12.05.2026 11:16:12
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
CVE-2023-25136
- EPSS 88.33%
- Veröffentlicht 03.02.2023 06:15:09
- Zuletzt bearbeitet 21.11.2024 07:49:10
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to an...