Libssh

Libssh

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 31.08.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:02

A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but a...

Exploit
  • EPSS 1.41%
  • Veröffentlicht 29.07.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:49

libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.

  • EPSS 0.11%
  • Veröffentlicht 13.04.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:15

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup th...

  • EPSS 1.12%
  • Veröffentlicht 10.12.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:27:37

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the ...

Exploit
  • EPSS 78.33%
  • Veröffentlicht 17.10.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:20

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

  • EPSS 3.66%
  • Veröffentlicht 13.04.2016 17:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH ...

  • EPSS 2.41%
  • Veröffentlicht 13.04.2016 17:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted S...

  • EPSS 2.78%
  • Veröffentlicht 29.12.2014 00:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.

  • EPSS 0.09%
  • Veröffentlicht 14.03.2014 15:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to ...

  • EPSS 1.02%
  • Veröffentlicht 05.02.2013 23:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init...