Openbsd

Openssh

126 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 53.64%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 18.12.2025 15:15:48

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...

  • EPSS 3.38%
  • Veröffentlicht 10.01.2019 21:29:00
  • Zuletzt bearbeitet 17.12.2025 22:15:55

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

  • EPSS 2.07%
  • Veröffentlicht 28.08.2018 08:29:00
  • Zuletzt bearbeitet 18.12.2025 12:15:53

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not w...

Exploit
  • EPSS 90.36%
  • Veröffentlicht 17.08.2018 19:29:00
  • Zuletzt bearbeitet 17.12.2025 22:15:54

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-...

  • EPSS 3.12%
  • Veröffentlicht 21.01.2018 22:29:00
  • Zuletzt bearbeitet 29.04.2026 16:16:21

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

  • EPSS 2.66%
  • Veröffentlicht 26.10.2017 03:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

  • EPSS 2.37%
  • Veröffentlicht 11.04.2017 18:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding...

  • EPSS 90.05%
  • Veröffentlicht 13.02.2017 17:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference be...

  • EPSS 1.17%
  • Veröffentlicht 05.01.2017 02:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.

  • EPSS 0.09%
  • Veröffentlicht 05.01.2017 02:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.