CVE-2014-2653
- EPSS 2.89%
- Veröffentlicht 27.03.2014 10:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
- EPSS 0.36%
- Veröffentlicht 18.03.2014 05:18:19
- Zuletzt bearbeitet 12.04.2025 10:46:40
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2011-4327
- EPSS 0.11%
- Veröffentlicht 03.02.2014 03:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2014-1692
- EPSS 7.56%
- Veröffentlicht 29.01.2014 16:02:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption...
- EPSS 0.31%
- Veröffentlicht 08.11.2013 15:55:13
- Zuletzt bearbeitet 11.04.2025 00:51:21
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended Force...
- EPSS 1.79%
- Veröffentlicht 07.03.2013 20:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodi...
CVE-2011-5000
- EPSS 0.91%
- Veröffentlicht 05.04.2012 14:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length fi...
CVE-2012-0814
- EPSS 0.83%
- Veröffentlicht 27.01.2012 19:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these m...
- EPSS 0.15%
- Veröffentlicht 02.03.2011 20:00:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of se...
- EPSS 1.72%
- Veröffentlicht 10.02.2011 18:00:57
- Zuletzt bearbeitet 11.04.2025 00:51:21
The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stac...