Openbsd

Openssh

126 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.9%
  • Veröffentlicht 07.03.2013 20:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodi...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 05.04.2012 14:55:03
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length fi...

  • EPSS 0.26%
  • Veröffentlicht 27.01.2012 19:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these m...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 02.03.2011 20:00:00
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of se...

  • EPSS 1.27%
  • Veröffentlicht 10.02.2011 18:00:57
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stac...

Exploit
  • EPSS 0.44%
  • Veröffentlicht 06.12.2010 22:30:31
  • Zuletzt bearbeitet 29.04.2026 01:13:23

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending c...

  • EPSS 0.04%
  • Veröffentlicht 01.10.2009 15:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use config...

  • EPSS 2.75%
  • Veröffentlicht 19.11.2008 17:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server f...

  • EPSS 1.06%
  • Veröffentlicht 18.09.2008 15:04:27
  • Zuletzt bearbeitet 23.04.2026 00:35:47

A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attac...

  • EPSS 2.75%
  • Veröffentlicht 27.08.2008 20:41:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact....