Openbsd

Openssh

126 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 22.07.2008 16:41:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the ...

Exploit
  • EPSS 4.64%
  • Veröffentlicht 18.07.2008 16:41:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.

  • EPSS 0.46%
  • Veröffentlicht 02.04.2008 18:44:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.

  • EPSS 0.2%
  • Veröffentlicht 24.03.2008 23:44:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and ...

  • EPSS 2.63%
  • Veröffentlicht 18.10.2007 20:17:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of the...

  • EPSS 2.27%
  • Veröffentlicht 12.09.2007 01:17:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted...

  • EPSS 0.85%
  • Veröffentlicht 04.09.2007 22:17:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via...

  • EPSS 0.19%
  • Veröffentlicht 21.05.2007 20:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwor...

  • EPSS 0.44%
  • Veröffentlicht 25.04.2007 16:19:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a s...

  • EPSS 3.01%
  • Veröffentlicht 08.11.2006 20:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed th...