CVE-2015-6564
- EPSS 2.06%
- Veröffentlicht 24.08.2015 01:59:01
- Zuletzt bearbeitet 06.05.2026 22:30:45
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MON...
CVE-2015-6563
- EPSS 0.08%
- Veröffentlicht 24.08.2015 01:59:00
- Zuletzt bearbeitet 06.05.2026 22:30:45
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjun...
CVE-2015-5600
- EPSS 69.1%
- Veröffentlicht 03.08.2015 01:59:03
- Zuletzt bearbeitet 06.05.2026 22:30:45
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force at...
CVE-2015-5352
- EPSS 5.39%
- Veröffentlicht 03.08.2015 01:59:01
- Zuletzt bearbeitet 06.05.2026 22:30:45
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictio...
- EPSS 0.35%
- Veröffentlicht 06.12.2014 15:59:07
- Zuletzt bearbeitet 06.05.2026 22:30:45
The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass in...
CVE-2014-2653
- EPSS 2.89%
- Veröffentlicht 27.03.2014 10:55:04
- Zuletzt bearbeitet 06.05.2026 22:30:45
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
- EPSS 0.2%
- Veröffentlicht 18.03.2014 05:18:19
- Zuletzt bearbeitet 06.05.2026 22:30:45
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2011-4327
- EPSS 0.06%
- Veröffentlicht 03.02.2014 03:55:03
- Zuletzt bearbeitet 29.04.2026 01:13:23
ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2014-1692
- EPSS 12.54%
- Veröffentlicht 29.01.2014 16:02:05
- Zuletzt bearbeitet 29.04.2026 01:13:23
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption...
- EPSS 0.31%
- Veröffentlicht 08.11.2013 15:55:13
- Zuletzt bearbeitet 29.04.2026 01:13:23
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended Force...