Openbsd

Openssh

126 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 56.63%
  • Veröffentlicht 10.10.2006 23:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames...

Exploit
  • EPSS 3.37%
  • Veröffentlicht 29.09.2006 00:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.

  • EPSS 2.62%
  • Veröffentlicht 27.09.2006 23:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

  • EPSS 14.97%
  • Veröffentlicht 27.09.2006 23:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

Exploit
  • EPSS 54.32%
  • Veröffentlicht 27.09.2006 01:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack d...

  • EPSS 1.97%
  • Veröffentlicht 07.03.2006 02:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting mu...

  • EPSS 0.09%
  • Veröffentlicht 25.01.2006 11:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

  • EPSS 0.71%
  • Veröffentlicht 06.09.2005 17:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.

  • EPSS 3.02%
  • Veröffentlicht 06.09.2005 17:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

  • EPSS 0.07%
  • Veröffentlicht 23.08.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate ...