Openbsd

Openssh

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.89%
  • Veröffentlicht 27.03.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

  • EPSS 0.36%
  • Veröffentlicht 18.03.2014 05:18:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.

  • EPSS 0.11%
  • Veröffentlicht 03.02.2014 03:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.

  • EPSS 7.56%
  • Veröffentlicht 29.01.2014 16:02:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption...

  • EPSS 0.31%
  • Veröffentlicht 08.11.2013 15:55:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended Force...

  • EPSS 1.79%
  • Veröffentlicht 07.03.2013 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodi...

Exploit
  • EPSS 0.91%
  • Veröffentlicht 05.04.2012 14:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length fi...

  • EPSS 0.83%
  • Veröffentlicht 27.01.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these m...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 02.03.2011 20:00:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of se...

  • EPSS 1.72%
  • Veröffentlicht 10.02.2011 18:00:57
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stac...