Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.25%
  • Veröffentlicht 29.06.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:44

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has ...

  • EPSS 0.83%
  • Veröffentlicht 01.06.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:12

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by cr...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 09.10.2019 20:15:23
  • Zuletzt bearbeitet 23.04.2025 16:15:20

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution...

  • EPSS 8.06%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...

Exploit
  • EPSS 45.17%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:57

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transfe...

Exploit
  • EPSS 57.89%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...

  • EPSS 3.74%
  • Veröffentlicht 10.01.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:59

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

  • EPSS 1.23%
  • Veröffentlicht 28.08.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:43

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not w...

Exploit
  • EPSS 90.29%
  • Veröffentlicht 17.08.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:53

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-...

  • EPSS 3.2%
  • Veröffentlicht 21.01.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 02:44:33

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.