Openbsd

Openssh

126 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.43%
  • Veröffentlicht 13.03.2022 00:15:07
  • Zuletzt bearbeitet 21.11.2024 06:13:36

An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the u...

  • EPSS 0.27%
  • Veröffentlicht 26.09.2021 19:15:07
  • Zuletzt bearbeitet 12.05.2026 10:16:36

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsC...

Exploit
  • EPSS 14.6%
  • Veröffentlicht 15.09.2021 20:15:07
  • Zuletzt bearbeitet 21.11.2024 02:47:33

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combi...

  • EPSS 0.24%
  • Veröffentlicht 05.03.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:59:01

ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.

Exploit
  • EPSS 64.28%
  • Veröffentlicht 24.07.2020 14:15:12
  • Zuletzt bearbeitet 28.07.2025 18:12:45

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous arg...

  • EPSS 1.56%
  • Veröffentlicht 29.06.2020 18:15:11
  • Zuletzt bearbeitet 18.12.2025 15:15:48

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has ...

  • EPSS 0.83%
  • Veröffentlicht 01.06.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:12

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by cr...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 09.10.2019 20:15:23
  • Zuletzt bearbeitet 23.04.2025 16:15:20

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution...

  • EPSS 9.74%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...

Exploit
  • EPSS 57.57%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 18.12.2025 15:15:47

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transfe...