ALT-PU-2024-3921-4
Package openssh-gostcrypto updated to version 7.9p1-alt4.gost.p10.1 for branch p10 in task 342647.
Closed vulnerabilities
BDU:2014-00019
Уязвимость программного обеспечения управления виртуальной инфраструктурой VMware vCenter Server, позволяющая злоумышленнику препятствовать входу других пользователей в систему
BDU:2015-01339
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01340
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01341
Уязвимости операционной системы Debian GNU/Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01958
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01959
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01960
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01961
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01962
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02532
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-02533
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-02534
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-04086
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-04087
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-04088
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-04127
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-04127
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-04226
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04227
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04932
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04932
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04932
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04932
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05680
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05681
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05682
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05683
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05684
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06145
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06145
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06146
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06146
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06147
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06147
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06148
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06148
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06149
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06149
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06150
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06150
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06151
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06151
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06465
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06465
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06465
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06465
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06466
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06467
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06467
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06467
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06467
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06468
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06469
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06469
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06469
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06469
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06470
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06471
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06471
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06471
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06471
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06472
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06473
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06473
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06473
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06473
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06474
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07467
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07469
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07471
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07472
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07474
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07734
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить целостность защищаемой информации
BDU:2015-07735
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить целостность защищаемой информации
BDU:2015-08183
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08183
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08183
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08184
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08184
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08184
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08184
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08184
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08184
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08185
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08185
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08185
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08186
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08186
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08186
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08187
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08187
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08187
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08187
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08187
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08187
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08188
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08188
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08188
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08189
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08189
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08189
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08190
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08190
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08190
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08190
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08190
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08190
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08191
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08191
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08191
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08192
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08192
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08192
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08193
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08193
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08193
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08193
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08193
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08193
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08194
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08194
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08194
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08195
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08195
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08195
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08196
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08196
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08196
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08196
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08196
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08196
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08197
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08197
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08197
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08365
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08366
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08367
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08368
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08369
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09497
Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09536
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09537
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09537
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09602
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09635
Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09635
Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2016-00407
Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00819
Уязвимости средства криптографической защиты OpenSSH, позволяющие нарушителю обойти ограничения интерпретатора команд
BDU:2016-02237
Уязвимость сетевого протокола ssh, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2016-02352
Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00350
Уязвимость менеджера разделяемой памяти демона sshd средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии
BDU:2017-00351
Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2017-00352
Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии
BDU:2017-00353
Уязвимость агента ssh-agent средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код
BDU:2017-01263
Уязвимость клиента средства криптографической защиты OpenSSH, позволяющая нарушителю получить доверенные права при взаимодействии с X11-сервером
BDU:2017-02607
Уязвимость функции process_open средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00117
Уязвимость функции auth_password службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01037
Уязвимость средства криптографической защиты OpenSSH, связанная с различной реакцией сервера на запросы аутентификации, позволяющая нарушителю выявить существующие учетные записи пользователей
BDU:2018-01500
Уязвимость функций сервера sshd средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00773
Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу
BDU:2019-00830
Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю манипулировать файлами в каталоге клиента
BDU:2019-00831
Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла
BDU:2019-00832
Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла
BDU:2019-01833
Уязвимость средства криптографической защиты OpenSSH, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-01913
Уязвимость функции resend_bytes средства криптографической защиты OpenSSH, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01914
Уязвимость функций roaming_read и roaming_write средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03788
Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу
BDU:2019-03791
Уязвимость функции refresh_progress_meter() (progressmeter.c) средства криптографической защиты OpenSSH, позволяющая нарушителю раскрыть защищаемую информацию или выполнить произвольный код
BDU:2021-01836
Уязвимость агента идентификационных ключей ssh-agent средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03142
Уязвимость средства криптографической защиты OpenSSH, связанная с ошибками управления привилегиями, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-03293
Уязвимость компонента authfile.c службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03294
Уязвимость службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03382
Уязвимость реализации средства криптографической защиты OpenSSH, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2021-03492
Уязвимость функции toremote средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольную команду
BDU:2021-03493
Уязвимость клиента scp средства криптографической защиты OpenSSH, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю перезаписывать произвольные файлы в каталоге загрузки клиента
BDU:2021-03494
Уязвимость средства криптографической защиты OpenSSH, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-07416
Уязвимость функции do_setup_env (session.c) службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии
BDU:2022-07484
Уязвимость функции kbdint_next_device() службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force) или вызвать отказ в обслуживании
BDU:2023-00711
Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код
BDU:2023-02094
Уязвимость агента идентификационных ключей ssh-agent средства криптографической защиты OpenSSH, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-03950
Уязвимость функции PKCS#11 компонента ssh-agent средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код
BDU:2023-07108
Уязвимость средства криптографической защиты OpenSSH, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код или остановить службу sshd
BDU:2023-07109
Уязвимость функции mm_answer_pam_free_ctx средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код или остановить службу sshd
BDU:2023-08853
Уязвимость реализации протокола SSH, связанная с возможностью откорректировать порядковые номера пакетов в процессе согласования соединения и добиться удаления произвольного числа служебных SSH-сообщений, позволяющая нарушителю обойти проверки целостности, отключить существующие функции безопасности, получить несанкционированный доступ к защищаемой информации
BDU:2023-08956
Уязвимость агента ssh-agent cредства криптографической защиты OpenSSH, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2024-04914
Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-1999-1010
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
Modified: 2024-11-21
CVE-2000-0143
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Modified: 2024-11-21
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Modified: 2024-11-21
CVE-2000-0525
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.
- 20000609 OpenSSH's UseLogin option allows remote access with root privilege.
- 20000609 OpenSSH's UseLogin option allows remote access with root privilege.
- 20000606 The non-default UseLogin feature in /etc/sshd_config is broken and should not be used.
- 20000606 The non-default UseLogin feature in /etc/sshd_config is broken and should not be used.
- 341
- 341
- 1334
- 1334
- openssh-uselogin-remote-exec(4646)
- openssh-uselogin-remote-exec(4646)
Modified: 2024-11-21
CVE-2000-0992
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Modified: 2024-11-21
CVE-2000-0999
Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow attackers to gain root privileges.
Modified: 2024-11-21
CVE-2000-1169
OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.
- 20001123 OpenSSH Security Advisory (adv.fwd)
- 20001123 OpenSSH Security Advisory (adv.fwd)
- 20001115 Trustix Security Advisory - bind and openssh (and modutils)
- 20001115 Trustix Security Advisory - bind and openssh (and modutils)
- CLSA-2000:345
- CLSA-2000:345
- SuSE-SA:2000:47
- SuSE-SA:2000:47
- 20001118 openssh: possible remote exploit
- 20001118 openssh: possible remote exploit
- MDKSA-2000:068
- MDKSA-2000:068
- 2114
- 2114
- 6248
- 6248
- RHSA-2000:111
- RHSA-2000:111
- 1949
- 1949
- openssh-unauthorized-access(5517)
- openssh-unauthorized-access(5517)
Modified: 2024-11-21
CVE-2001-0144
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
- 20010208 [CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector
- 20010208 [CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector
- 20010208 Remote vulnerability in SSH daemon crc32 compensation attack detector
- 20010208 Remote vulnerability in SSH daemon crc32 compensation attack detector
- CA-2001-35
- CA-2001-35
- 503
- 503
- 795
- 795
- 2347
- 2347
- ssh-deattack-overwrite-memory(6083)
- ssh-deattack-overwrite-memory(6083)
Modified: 2024-11-21
CVE-2001-0361
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
- FreeBSD-SA-01:24
- FreeBSD-SA-01:24
- 20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability
- 20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability
- L-047
- L-047
- DSA-023
- DSA-023
- DSA-027
- DSA-027
- DSA-086
- DSA-086
- SuSE-SA:2001:04
- SuSE-SA:2001:04
- 2116
- 2116
- 2344
- 2344
- ssh-session-key-recovery(6082)
- ssh-session-key-recovery(6082)
Modified: 2024-11-21
CVE-2001-0529
OpenSSH version 2.9 and earlier, with X forwarding enabled, allows a local attacker to delete any file named 'cookies' via a symlink attack.
- NetBSD-SA2001-010
- NetBSD-SA2001-010
- 20010604 SSH allows deletion of other users files...
- 20010604 SSH allows deletion of other users files...
- 20010604 Re: SSH allows deletion of other users files...
- 20010604 Re: SSH allows deletion of other users files...
- CLA-2001:431
- CLA-2001:431
- IMNX-2001-70-034-01
- IMNX-2001-70-034-01
- 20010605 OpenSSH_2.5.2p2 RH7.0 <- version info
- 20010605 OpenSSH_2.5.2p2 RH7.0 <- version info
- CSSA-2001-023.0
- CSSA-2001-023.0
- VU#655259
- VU#655259
- 20010612
- 20010612
- 1853
- 1853
- 2825
- 2825
- openssh-symlink-file-deletion(6676)
- openssh-symlink-file-deletion(6676)
Modified: 2024-11-21
CVE-2001-0572
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
Modified: 2024-11-21
CVE-2001-0816
OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
- 20010918 OpenSSH: sftp & bypassing keypair auth restrictions
- 20010918 OpenSSH: sftp & bypassing keypair auth restrictions
- CLSA-2001:431
- CLSA-2001:431
- IMNX-2001-70-034-01
- IMNX-2001-70-034-01
- 5536
- 5536
- RHSA-2001:154
- RHSA-2001:154
- openssh-sftp-bypass-restrictions(7634)
- openssh-sftp-bypass-restrictions(7634)
Modified: 2024-11-21
CVE-2001-0872
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
- CSSA-2001-042.1
- CSSA-2001-042.1
- CLA-2001:446
- CLA-2001:446
- MDKSA-2001:092
- MDKSA-2001:092
- SuSE-SA:2001:045
- SuSE-SA:2001:045
- 20011204 [Fwd: OpenSSH 3.0.2 fixes UseLogin vulnerability]
- 20011204 [Fwd: OpenSSH 3.0.2 fixes UseLogin vulnerability]
- http://marc.info/?l=openssh-unix-dev&m=100747128105913&w=2
- http://marc.info/?l=openssh-unix-dev&m=100747128105913&w=2
- M-026
- M-026
- DSA-091
- DSA-091
- VU#157447
- VU#157447
- 688
- 688
- RHSA-2001:161
- RHSA-2001:161
- 3614
- 3614
- HPSBUX0112-005
- HPSBUX0112-005
- openssh-uselogin-execute-code(7647)
- openssh-uselogin-execute-code(7647)
Modified: 2024-11-21
CVE-2001-1029
libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.
Modified: 2024-11-21
CVE-2001-1380
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
- CLSA-2001:431
- CLSA-2001:431
- IMNX-2001-70-034-01
- IMNX-2001-70-034-01
- 20010926 OpenSSH Security Advisory (adv.option)
- 20010926 OpenSSH Security Advisory (adv.option)
- RHSA-2001:114
- RHSA-2001:114
- M-010
- M-010
- VU#905795
- VU#905795
- MDKSA-2001:081
- MDKSA-2001:081
- 642
- 642
- 3369
- 3369
- openssh-access-control-bypass(7179)
- openssh-access-control-bypass(7179)
Modified: 2024-11-21
CVE-2001-1382
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
Modified: 2024-11-21
CVE-2001-1459
OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Modified: 2024-11-21
CVE-2001-1507
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
Modified: 2024-11-21
CVE-2001-1585
SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.
- 20010208 Authentication By-Pass Vulnerability in OpenSSH-2.3.1 (devel snapshot)
- 20010208 Authentication By-Pass Vulnerability in OpenSSH-2.3.1 (devel snapshot)
- 2356
- 2356
- http://www.openbsd.org/advisories/ssh_bypass.txt
- http://www.openbsd.org/advisories/ssh_bypass.txt
- openssh-bypass-authentication(6084)
- openssh-bypass-authentication(6084)
Modified: 2024-11-21
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
- FreeBSD-SA-02:13
- FreeBSD-SA-02:13
- NetBSD-SA2002-004
- NetBSD-SA2002-004
- CSSA-2002-SCO.10
- CSSA-2002-SCO.10
- CSSA-2002-SCO.11
- CSSA-2002-SCO.11
- 20020311 TSLSA-2002-0039 - openssh
- 20020311 TSLSA-2002-0039 - openssh
- 20020307 [VulnWatch] [PINE-CERT-20020301] OpenSSH off-by-one
- 20020307 [VulnWatch] [PINE-CERT-20020301] OpenSSH off-by-one
- CLA-2002:467
- CLA-2002:467
- 20020307 [PINE-CERT-20020301] OpenSSH off-by-one
- 20020307 [PINE-CERT-20020301] OpenSSH off-by-one
- 20020307 OpenSSH Security Advisory (adv.channelalloc)
- 20020307 OpenSSH Security Advisory (adv.channelalloc)
- 20020308 [OpenPKG-SA-2002.002] OpenPKG Security Advisory (openssh)
- 20020308 [OpenPKG-SA-2002.002] OpenPKG Security Advisory (openssh)
- 20020310 OpenSSH 2.9.9p2 packages for Immunix 6.2 with latest fix
- 20020310 OpenSSH 2.9.9p2 packages for Immunix 6.2 with latest fix
- HPSBTL0203-029
- HPSBTL0203-029
- 20020328 OpenSSH channel_lookup() off by one exploit
- 20020328 OpenSSH channel_lookup() off by one exploit
- CSSA-2002-012.0
- CSSA-2002-012.0
- DSA-119
- DSA-119
- openssh-channel-error(8383)
- openssh-channel-error(8383)
- MDKSA-2002:019
- MDKSA-2002:019
- ESA-20020307-007
- ESA-20020307-007
- SuSE-SA:2002:009
- SuSE-SA:2002:009
- http://www.openbsd.org/advisories/ssh_channelalloc.txt
- http://www.openbsd.org/advisories/ssh_channelalloc.txt
- 730
- 730
- RHSA-2002:043
- RHSA-2002:043
- 4241
- 4241
Modified: 2024-11-21
CVE-2002-0575
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
- CSSA-2002-022.2
- CSSA-2002-022.2
- 20020420 OpenSSH Security Advisory (adv.token)
- 20020420 OpenSSH Security Advisory (adv.token)
- 20020429 TSLSA-2002-0047 - openssh
- 20020429 TSLSA-2002-0047 - openssh
- 20020517 OpenSSH 3.2.2 released (fwd)
- 20020517 OpenSSH 3.2.2 released (fwd)
- 20020419 OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
- 20020419 OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
- 20020419 OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
- 20020419 OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
- 20020426 Revised OpenSSH Security Advisory (adv.token)
- 20020426 Revised OpenSSH Security Advisory (adv.token)
- openssh-sshd-kerberos-bo(8896)
- openssh-sshd-kerberos-bo(8896)
- 781
- 781
- 4560
- 4560
Modified: 2024-11-21
CVE-2002-0639
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
- CSSA-2002-030.0
- CSSA-2002-030.0
- 20020626 [OpenPKG-SA-2002.005] OpenPKG Security Advisory (openssh)
- 20020626 [OpenPKG-SA-2002.005] OpenPKG Security Advisory (openssh)
- CLA-2002:502
- CLA-2002:502
- 20020626 OpenSSH Security Advisory (adv.iss)
- 20020626 OpenSSH Security Advisory (adv.iss)
- 20020626 Revised OpenSSH Security Advisory (adv.iss)
- 20020626 Revised OpenSSH Security Advisory (adv.iss)
- 20020627 How to reproduce OpenSSH Overflow.
- 20020627 How to reproduce OpenSSH Overflow.
- CA-2002-18
- CA-2002-18
- DSA-134
- DSA-134
- openssh-challenge-response-bo(9169)
- openssh-challenge-response-bo(9169)
- VU#369347
- VU#369347
- ESA-20020702-016
- ESA-20020702-016
- MDKSA-2002:040
- MDKSA-2002:040
- 6245
- 6245
- 5093
- 5093
- HPSBUX0206-195
- HPSBUX0206-195
- https://twitter.com/RooneyMcNibNug/status/1152332585349111810
- https://twitter.com/RooneyMcNibNug/status/1152332585349111810
- 20020626 OpenSSH Remote Challenge Vulnerability
- 20020626 OpenSSH Remote Challenge Vulnerability
Modified: 2024-11-21
CVE-2002-0640
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
- CSSA-2002-030.0
- CSSA-2002-030.0
- CLA-2002:502
- CLA-2002:502
- 20020626 OpenSSH Security Advisory (adv.iss)
- 20020626 OpenSSH Security Advisory (adv.iss)
- 20020626 Revised OpenSSH Security Advisory (adv.iss)
- 20020626 Revised OpenSSH Security Advisory (adv.iss)
- 20020627 How to reproduce OpenSSH Overflow.
- 20020627 How to reproduce OpenSSH Overflow.
- 20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability
- 20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability
- CA-2002-18
- CA-2002-18
- DSA-134
- DSA-134
- VU#369347
- VU#369347
- ESA-20020702-016
- ESA-20020702-016
- MDKSA-2002:040
- MDKSA-2002:040
- SuSE-SA:2002:024
- SuSE-SA:2002:024
- [oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
- [oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
- 839
- 839
- RHSA-2002:127
- RHSA-2002:127
- RHSA-2002:131
- RHSA-2002:131
- 5093
- 5093
- HPSBUX0206-195
- HPSBUX0206-195
Modified: 2024-11-21
CVE-2002-0765
sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.
Modified: 2024-11-21
CVE-2003-0190
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
- http://lab.mediaservice.net/advisory/2003-01-openssh.txt
- http://lab.mediaservice.net/advisory/2003-01-openssh.txt
- 20030430 OpenSSH/PAM timing attack allows remote users identification
- 20030430 OpenSSH/PAM timing attack allows remote users identification
- 20030430 OpenSSH/PAM timing attack allows remote users identification
- 20030430 OpenSSH/PAM timing attack allows remote users identification
- 20030806 [OpenPKG-SA-2003.035] OpenPKG Security Advisory (openssh)
- 20030806 [OpenPKG-SA-2003.035] OpenPKG Security Advisory (openssh)
- RHSA-2003:222
- RHSA-2003:222
- RHSA-2003:224
- RHSA-2003:224
- 7467
- 7467
- TLSA-2003-31
- TLSA-2003-31
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- oval:org.mitre.oval:def:445
- oval:org.mitre.oval:def:445
Modified: 2024-11-21
CVE-2003-0386
OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.
- 20060703-01-P
- 20060703-01-P
- http://lists.apple.com/mhonarc/security-announce/msg00038.html
- http://lists.apple.com/mhonarc/security-announce/msg00038.html
- 21129
- 21129
- 21262
- 21262
- 21724
- 21724
- 22196
- 22196
- 23680
- 23680
- http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
- VU#978316
- VU#978316
- RHSA-2006:0298
- RHSA-2006:0298
- RHSA-2006:0698
- RHSA-2006:0698
- 20030605 OpenSSH remote clent address restriction circumvention
- 20030605 OpenSSH remote clent address restriction circumvention
- 7831
- 7831
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- oval:org.mitre.oval:def:9894
- oval:org.mitre.oval:def:9894
Modified: 2024-11-21
CVE-2003-0682
"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
- CLA-2003:741
- CLA-2003:741
- RHSA-2003:279
- RHSA-2003:279
- 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
- 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
- DSA-382
- DSA-382
- DSA-383
- DSA-383
- RHSA-2003:280
- RHSA-2003:280
- oval:org.mitre.oval:def:446
- oval:org.mitre.oval:def:446
Modified: 2024-11-21
CVE-2003-0693
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.
- 20030915 new ssh exploit?
- 20030915 new ssh exploit?
- 20030915 openssh remote exploit
- 20030915 openssh remote exploit
- 20030916 The lowdown on SSH vulnerability
- 20030916 The lowdown on SSH vulnerability
- 20030916 OpenSSH Buffer Management Bug Advisory
- 20030916 OpenSSH Buffer Management Bug Advisory
- RHSA-2003:279
- RHSA-2003:279
- 20030916 [slackware-security] OpenSSH Security Advisory (SSA:2003-259-01)
- 20030916 [slackware-security] OpenSSH Security Advisory (SSA:2003-259-01)
- 2003-0033
- 2003-0033
- 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
- 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
- 1000620
- 1000620
- CA-2003-24
- CA-2003-24
- DSA-382
- DSA-382
- DSA-383
- DSA-383
- VU#333628
- VU#333628
- MDKSA-2003:090
- MDKSA-2003:090
- http://www.openssh.com/txt/buffer.adv
- http://www.openssh.com/txt/buffer.adv
- [oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
- [oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
- RHSA-2003:280
- RHSA-2003:280
- openssh-packet-bo(13191)
- openssh-packet-bo(13191)
- oval:org.mitre.oval:def:2719
- oval:org.mitre.oval:def:2719
- oval:org.mitre.oval:def:447
- oval:org.mitre.oval:def:447
Modified: 2024-11-21
CVE-2003-0695
Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.
- CLA-2003:741
- CLA-2003:741
- RHSA-2003:279
- RHSA-2003:279
- 2003-0033
- 2003-0033
- 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
- 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
- 20030917 [slackware-security] OpenSSH updated again (SSA:2003-260-01)
- 20030917 [slackware-security] OpenSSH updated again (SSA:2003-260-01)
- http://marc.info/?l=openbsd-security-announce&m=106375582924840
- http://marc.info/?l=openbsd-security-announce&m=106375582924840
- DSA-382
- DSA-382
- DSA-383
- DSA-383
- MDKSA-2003:090
- MDKSA-2003:090
- http://www.openssh.com/txt/buffer.adv
- http://www.openssh.com/txt/buffer.adv
- RHSA-2003:280
- RHSA-2003:280
- oval:org.mitre.oval:def:452
- oval:org.mitre.oval:def:452
Modified: 2024-11-21
CVE-2003-0786
The SSH1 PAM challenge response authentication in OpenSSH 3.7.1 and 3.7.1p1, when Privilege Separation is disabled, does not check the result of the authentication attempt, which can allow remote attackers to gain privileges.
- 20030924 [OpenPKG-SA-2003.042] OpenPKG Security Advisory (openssh)
- 20030924 [OpenPKG-SA-2003.042] OpenPKG Security Advisory (openssh)
- VU#602204
- VU#602204
- http://www.openssh.com/txt/sshpam.adv
- http://www.openssh.com/txt/sshpam.adv
- 20030923 Portable OpenSSH 3.7.1p2 released
- 20030923 Portable OpenSSH 3.7.1p2 released
- 20030923 Multiple PAM vulnerabilities in portable OpenSSH
- 20030923 Multiple PAM vulnerabilities in portable OpenSSH
- 8677
- 8677
Modified: 2024-11-21
CVE-2003-0787
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
- 20030924 [OpenPKG-SA-2003.042] OpenPKG Security Advisory (openssh)
- 20030924 [OpenPKG-SA-2003.042] OpenPKG Security Advisory (openssh)
- VU#209807
- VU#209807
- http://www.openssh.com/txt/sshpam.adv
- http://www.openssh.com/txt/sshpam.adv
- 20030923 Portable OpenSSH 3.7.1p2 released
- 20030923 Portable OpenSSH 3.7.1p2 released
- 20030923 Multiple PAM vulnerabilities in portable OpenSSH
- 20030923 Multiple PAM vulnerabilities in portable OpenSSH
- 8677
- 8677
Modified: 2024-11-21
CVE-2003-1562
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747
- 20030501 Re: OpenSSH/PAM timing attack allows remote users identification
- 20030501 Re: OpenSSH/PAM timing attack allows remote users identification
- 20030501 Re: OpenSSH/PAM timing attack allows remote users identification
- 20030501 Re: OpenSSH/PAM timing attack allows remote users identification
- 20030505 Re: OpenSSH/PAM timing attack allows remote users identification
- 20030505 Re: OpenSSH/PAM timing attack allows remote users identification
- 7482
- 7482
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Modified: 2024-11-21
CVE-2004-0175
Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992.
- SCOSA-2006.11
- SCOSA-2006.11
- CLSA-2004:831
- CLSA-2004:831
- 17135
- 17135
- 19243
- 19243
- O-212
- O-212
- http://www.juniper.net/support/security/alerts/adv59739.txt
- http://www.juniper.net/support/security/alerts/adv59739.txt
- MDKSA-2005:100
- MDKSA-2005:100
- MDVSA-2008:191
- MDVSA-2008:191
- SuSE-SA:2004:009
- SuSE-SA:2004:009
- 9550
- 9550
- RHSA-2005:074
- RHSA-2005:074
- RHSA-2005:106
- RHSA-2005:106
- RHSA-2005:165
- RHSA-2005:165
- RHSA-2005:481
- RHSA-2005:481
- RHSA-2005:495
- RHSA-2005:495
- RHSA-2005:562
- RHSA-2005:562
- RHSA-2005:567
- RHSA-2005:567
- 9986
- 9986
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120147
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120147
- openssh-scp-file-overwrite(16323)
- openssh-scp-file-overwrite(16323)
- oval:org.mitre.oval:def:10184
- oval:org.mitre.oval:def:10184
Modified: 2024-11-21
CVE-2004-1653
The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
Modified: 2024-11-21
CVE-2004-2069
sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
- [openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time
- [openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time
- [openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time
- [openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time
- RHSA-2005:550
- RHSA-2005:550
- 17000
- 17000
- 17135
- 17135
- 17252
- 17252
- 22875
- 22875
- 23680
- 23680
- http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf
- http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf
- http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf
- http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf
- 16567
- 16567
- FLSA-2006:168935
- FLSA-2006:168935
- 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
- 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
- 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
- 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
- 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
- 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
- 14963
- 14963
- http://www.vmware.com/download/esx/esx-202-200610-patch.html
- http://www.vmware.com/download/esx/esx-202-200610-patch.html
- http://www.vmware.com/download/esx/esx-213-200610-patch.html
- http://www.vmware.com/download/esx/esx-213-200610-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- ADV-2006-4502
- ADV-2006-4502
- openssh-sshdc-logingracetime-dos(20930)
- openssh-sshdc-logingracetime-dos(20930)
- oval:org.mitre.oval:def:11541
- oval:org.mitre.oval:def:11541
Modified: 2024-11-21
CVE-2004-2760
sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190. NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.
Modified: 2024-11-21
CVE-2005-2666
SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.
- SCOSA-2006.11
- SCOSA-2006.11
- http://nms.csail.mit.edu/projects/ssh/
- http://nms.csail.mit.edu/projects/ssh/
- 19243
- 19243
- 25098
- 25098
- http://www.eweek.com/article2/0%2C1759%2C1815795%2C00.asp
- http://www.eweek.com/article2/0%2C1759%2C1815795%2C00.asp
- RHSA-2007:0257
- RHSA-2007:0257
- oval:org.mitre.oval:def:10201
- oval:org.mitre.oval:def:10201
Modified: 2024-11-21
CVE-2005-2797
OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
- SCOSA-2006.11
- SCOSA-2006.11
- SCOSA-2005.53
- SCOSA-2005.53
- OpenPKG-SA-2005.019
- OpenPKG-SA-2005.019
- 16686
- 16686
- 18010
- 18010
- 18661
- 18661
- 19243
- 19243
- 1014845
- 1014845
- http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
- [openssh-unix-announce] 20050901 Announce: OpenSSH 4.2 released
- [openssh-unix-announce] 20050901 Announce: OpenSSH 4.2 released
- 19142
- 19142
- 14727
- 14727
Modified: 2024-11-21
CVE-2005-2798
sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
- SCOSA-2005.53
- SCOSA-2005.53
- SUSE-SR:2006:003
- SUSE-SR:2006:003
- 16686
- 16686
- 17077
- 17077
- 17245
- 17245
- 18010
- 18010
- 18406
- 18406
- 18507
- 18507
- 18661
- 18661
- 18717
- 18717
- 1014845
- 1014845
- http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
- MDKSA-2005:172
- MDKSA-2005:172
- [openssh-unix-announce] 20050901 Announce: OpenSSH 4.2 released
- [openssh-unix-announce] 20050901 Announce: OpenSSH 4.2 released
- 19141
- 19141
- RHSA-2005:527
- RHSA-2005:527
- HPSBUX02090
- HPSBUX02090
- SSRT051058
- SSRT051058
- 14729
- 14729
- ADV-2006-0144
- ADV-2006-0144
- hpux-secure-shell-dos(24064)
- hpux-secure-shell-dos(24064)
- oval:org.mitre.oval:def:1345
- oval:org.mitre.oval:def:1345
- oval:org.mitre.oval:def:1566
- oval:org.mitre.oval:def:1566
- oval:org.mitre.oval:def:9717
- oval:org.mitre.oval:def:9717
- USN-209-1
- USN-209-1
Modified: 2024-11-21
CVE-2006-0225
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
- 20060212 [3.8] 005: SECURITY FIX: February 12, 2006
- 20060212 [3.8] 005: SECURITY FIX: February 12, 2006
- 20060703-01-P
- 20060703-01-P
- http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
- http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
- http://docs.info.apple.com/article.html?artnum=305214
- http://docs.info.apple.com/article.html?artnum=305214
- HPSBUX02178
- HPSBUX02178
- SSRT061267
- SSRT061267
- APPLE-SA-2007-03-13
- APPLE-SA-2007-03-13
- 18579
- 18579
- 18595
- 18595
- 18650
- 18650
- 18736
- 18736
- 18798
- 18798
- 18850
- 18850
- 18910
- 18910
- 18964
- 18964
- 18969
- 18969
- 18970
- 18970
- 19159
- 19159
- 20723
- 20723
- 21129
- 21129
- 21262
- 21262
- 21492
- 21492
- 21724
- 21724
- 22196
- 22196
- 23241
- 23241
- 23340
- 23340
- 23680
- 23680
- 24479
- 24479
- 25607
- 25607
- 25936
- 25936
- 462
- 462
- 1015540
- 1015540
- SSA:2006-045-06
- SSA:2006-045-06
- 102961
- 102961
- http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
- http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
- http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
- GLSA-200602-11
- GLSA-200602-11
- MDKSA-2006:034
- MDKSA-2006:034
- SUSE-SA:2006:008
- SUSE-SA:2006:008
- OpenPKG-SA-2006.003
- OpenPKG-SA-2006.003
- 22692
- 22692
- FEDORA-2006-056
- FEDORA-2006-056
- RHSA-2006:0044
- RHSA-2006:0044
- RHSA-2006:0298
- RHSA-2006:0298
- RHSA-2006:0698
- RHSA-2006:0698
- FLSA-2006:168935
- FLSA-2006:168935
- 16369
- 16369
- 2006-0004
- 2006-0004
- USN-255-1
- USN-255-1
- TA07-072A
- TA07-072A
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- ADV-2006-0306
- ADV-2006-0306
- ADV-2006-2490
- ADV-2006-2490
- ADV-2006-4869
- ADV-2006-4869
- ADV-2007-0930
- ADV-2007-0930
- ADV-2007-2120
- ADV-2007-2120
- http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
- http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
- openssh-scp-command-execution(24305)
- openssh-scp-command-execution(24305)
- oval:org.mitre.oval:def:1138
- oval:org.mitre.oval:def:1138
- oval:org.mitre.oval:def:9962
- oval:org.mitre.oval:def:9962
Modified: 2024-11-21
CVE-2006-0883
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
Modified: 2024-11-21
CVE-2006-4924
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
- FreeBSD-SA-06:22.openssh
- FreeBSD-SA-06:22.openssh
- SCOSA-2008.2
- SCOSA-2008.2
- 20061001-01-P
- 20061001-01-P
- http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
- http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
- http://bugs.gentoo.org/show_bug.cgi?id=148228
- http://bugs.gentoo.org/show_bug.cgi?id=148228
- http://docs.info.apple.com/article.html?artnum=305214
- http://docs.info.apple.com/article.html?artnum=305214
- HPSBUX02178
- HPSBUX02178
- SSRT061267
- SSRT061267
- APPLE-SA-2007-03-13
- APPLE-SA-2007-03-13
- [openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
- [openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
- 21923
- 21923
- 22091
- 22091
- 22116
- 22116
- 22158
- 22158
- 22164
- 22164
- 22183
- 22183
- 22196
- 22196
- 22208
- 22208
- 22236
- 22236
- 22245
- 22245
- 22270
- 22270
- 22298
- 22298
- 22352
- 22352
- 22362
- 22362
- 22487
- 22487
- 22495
- 22495
- 22823
- 22823
- 22926
- 22926
- 23038
- 23038
- 23241
- 23241
- 23340
- 23340
- 23680
- 23680
- 24479
- 24479
- 24799
- 24799
- 24805
- 24805
- 25608
- 25608
- 29371
- 29371
- 34274
- 34274
- FreeBSD-SA-06:22
- FreeBSD-SA-06:22
- GLSA-200609-17
- GLSA-200609-17
- GLSA-200611-06
- GLSA-200611-06
- 1016931
- 1016931
- SSA:2006-272-02
- SSA:2006-272-02
- http://sourceforge.net/forum/forum.php?forum_id=681763
- http://sourceforge.net/forum/forum.php?forum_id=681763
- http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
- http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
- 102962
- 102962
- http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
- DSA-1189
- DSA-1189
- DSA-1212
- DSA-1212
- VU#787448
- VU#787448
- MDKSA-2006:179
- MDKSA-2006:179
- SUSE-SR:2006:024
- SUSE-SR:2006:024
- SUSE-SA:2006:062
- SUSE-SA:2006:062
- [2.9] 015: SECURITY FIX: October 12, 2006
- [2.9] 015: SECURITY FIX: October 12, 2006
- OpenPKG-SA-2006.022
- OpenPKG-SA-2006.022
- 29152
- 29152
- RHSA-2006:0697
- RHSA-2006:0697
- RHSA-2006:0698
- RHSA-2006:0698
- 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20216
- 20216
- 2006-0054
- 2006-0054
- USN-355-1
- USN-355-1
- TA07-072A
- TA07-072A
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- ADV-2006-3777
- ADV-2006-3777
- ADV-2006-4401
- ADV-2006-4401
- ADV-2006-4869
- ADV-2006-4869
- ADV-2007-0930
- ADV-2007-0930
- ADV-2007-1332
- ADV-2007-1332
- ADV-2007-2119
- ADV-2007-2119
- ADV-2009-0740
- ADV-2009-0740
- [security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability
- [security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
- openssh-block-dos(29158)
- openssh-block-dos(29158)
- https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
- https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
- https://issues.rpath.com/browse/RPL-661
- https://issues.rpath.com/browse/RPL-661
- oval:org.mitre.oval:def:10462
- oval:org.mitre.oval:def:10462
- oval:org.mitre.oval:def:1193
- oval:org.mitre.oval:def:1193
Modified: 2024-11-21
CVE-2006-4925
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
- http://bugs.gentoo.org/show_bug.cgi?id=148228
- http://bugs.gentoo.org/show_bug.cgi?id=148228
- 22245
- 22245
- 22298
- 22298
- 22495
- 22495
- 23038
- 23038
- MDKSA-2006:179
- MDKSA-2006:179
- SUSE-SR:2006:024
- SUSE-SR:2006:024
- SUSE-SA:2006:062
- SUSE-SA:2006:062
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/packet.c.diff?r1=1.144&r2=1.145&f=h
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/packet.c.diff?r1=1.144&r2=1.145&f=h
- OpenPKG-SA-2006.022
- OpenPKG-SA-2006.022
- 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server
- https://issues.rpath.com/browse/RPL-661
- https://issues.rpath.com/browse/RPL-661
- https://issues.rpath.com/browse/RPL-681
- https://issues.rpath.com/browse/RPL-681
Modified: 2024-11-21
CVE-2006-5051
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
- FreeBSD-SA-06:22.openssh
- FreeBSD-SA-06:22.openssh
- 20061001-01-P
- 20061001-01-P
- http://docs.info.apple.com/article.html?artnum=305214
- http://docs.info.apple.com/article.html?artnum=305214
- APPLE-SA-2007-03-13
- APPLE-SA-2007-03-13
- [freebsd-security] 20061002 FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
- [freebsd-security] 20061002 FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
- [openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
- [openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
- http://openssh.org/txt/release-4.4
- http://openssh.org/txt/release-4.4
- 22158
- 22158
- 22173
- 22173
- 22183
- 22183
- 22196
- 22196
- 22208
- 22208
- 22236
- 22236
- 22245
- 22245
- 22270
- 22270
- 22352
- 22352
- 22362
- 22362
- 22487
- 22487
- 22495
- 22495
- 22823
- 22823
- 22926
- 22926
- 23680
- 23680
- 24479
- 24479
- 24799
- 24799
- 24805
- 24805
- FreeBSD-SA-06:22
- FreeBSD-SA-06:22
- GLSA-200611-06
- GLSA-200611-06
- 1016940
- 1016940
- SSA:2006-272-02
- SSA:2006-272-02
- http://sourceforge.net/forum/forum.php?forum_id=681763
- http://sourceforge.net/forum/forum.php?forum_id=681763
- http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
- http://www.arkoon.fr/upload/alertes/36AK-2006-07-FR-1.0_FAST360_OPENSSH.pdf
- http://www.arkoon.fr/upload/alertes/36AK-2006-07-FR-1.0_FAST360_OPENSSH.pdf
- http://www.arkoon.fr/upload/alertes/43AK-2006-09-FR-1.0_SSL360_OPENSSH.pdf
- http://www.arkoon.fr/upload/alertes/43AK-2006-09-FR-1.0_SSL360_OPENSSH.pdf
- DSA-1189
- DSA-1189
- DSA-1212
- DSA-1212
- VU#851340
- VU#851340
- MDKSA-2006:179
- MDKSA-2006:179
- SUSE-SA:2006:062
- SUSE-SA:2006:062
- [2.9] 015: SECURITY FIX: October 12, 2006
- [2.9] 015: SECURITY FIX: October 12, 2006
- OpenPKG-SA-2006.022
- OpenPKG-SA-2006.022
- [oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
- [oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
- [oss-security] 20240728 Re: Announce: OpenSSH 9.8 released
- [oss-security] 20240728 Re: Announce: OpenSSH 9.8 released
- 29264
- 29264
- RHSA-2006:0697
- RHSA-2006:0697
- RHSA-2006:0698
- RHSA-2006:0698
- 20241
- 20241
- USN-355-1
- USN-355-1
- TA07-072A
- TA07-072A
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- ADV-2006-4018
- ADV-2006-4018
- ADV-2006-4329
- ADV-2006-4329
- ADV-2007-0930
- ADV-2007-0930
- ADV-2007-1332
- ADV-2007-1332
- [security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability
- [security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability
- openssh-signal-handler-race-condition(29254)
- openssh-signal-handler-race-condition(29254)
- oval:org.mitre.oval:def:11387
- oval:org.mitre.oval:def:11387
- https://www.openwall.com/lists/oss-security/2024/07/28/3
- https://www.openwall.com/lists/oss-security/2024/07/28/3
Modified: 2024-11-21
CVE-2006-5052
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
- http://docs.info.apple.com/article.html?artnum=305214
- http://docs.info.apple.com/article.html?artnum=305214
- APPLE-SA-2007-03-13
- APPLE-SA-2007-03-13
- [openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
- [openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
- http://openssh.org/txt/release-4.4
- http://openssh.org/txt/release-4.4
- RHSA-2006:0697
- RHSA-2006:0697
- 22158
- 22158
- 22173
- 22173
- 22495
- 22495
- 22823
- 22823
- 24479
- 24479
- 27588
- 27588
- 28320
- 28320
- GLSA-200611-06
- GLSA-200611-06
- 1016939
- 1016939
- SSA:2006-272-02
- SSA:2006-272-02
- http://support.avaya.com/elmodocs2/security/ASA-2007-527.htm
- http://support.avaya.com/elmodocs2/security/ASA-2007-527.htm
- SUSE-SA:2006:062
- SUSE-SA:2006:062
- 29266
- 29266
- RHSA-2007:0540
- RHSA-2007:0540
- RHSA-2007:0703
- RHSA-2007:0703
- 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20245
- 20245
- TA07-072A
- TA07-072A
- ADV-2007-0930
- ADV-2007-0930
- openssh-gssapi-user-enumeration(29255)
- openssh-gssapi-user-enumeration(29255)
- https://issues.rpath.com/browse/RPL-681
- https://issues.rpath.com/browse/RPL-681
- oval:org.mitre.oval:def:10178
- oval:org.mitre.oval:def:10178
Modified: 2024-11-21
CVE-2006-5794
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
- 20061201-01-P
- 20061201-01-P
- RHSA-2006:0738
- RHSA-2006:0738
- 22771
- 22771
- 22772
- 22772
- 22773
- 22773
- 22778
- 22778
- 22814
- 22814
- 22872
- 22872
- 22932
- 22932
- 23513
- 23513
- 23680
- 23680
- 24055
- 24055
- 1017183
- 1017183
- http://sourceforge.net/project/shownotes.php?release_id=461854&group_id=69227
- http://sourceforge.net/project/shownotes.php?release_id=461854&group_id=69227
- http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
- http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
- http://support.avaya.com/elmodocs2/security/ASA-2007-048.htm
- http://support.avaya.com/elmodocs2/security/ASA-2007-048.htm
- MDKSA-2006:204
- MDKSA-2006:204
- SUSE-SR:2006:026
- SUSE-SR:2006:026
- OpenPKG-SA-2006.032
- OpenPKG-SA-2006.032
- http://www.openssh.org/txt/release-4.5
- http://www.openssh.org/txt/release-4.5
- 20061109 rPSA-2006-0207-1 openssh openssh-client openssh-server
- 20061109 rPSA-2006-0207-1 openssh openssh-client openssh-server
- 20956
- 20956
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
- ADV-2006-4399
- ADV-2006-4399
- ADV-2006-4400
- ADV-2006-4400
- openssh-separation-verificaton-weakness(30120)
- openssh-separation-verificaton-weakness(30120)
- https://issues.rpath.com/browse/RPL-766
- https://issues.rpath.com/browse/RPL-766
- oval:org.mitre.oval:def:11840
- oval:org.mitre.oval:def:11840
Modified: 2024-11-21
CVE-2007-2243
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
- 20070421 OpenSSH - System Account Enumeration if S/Key is used
- 20070421 OpenSSH - System Account Enumeration if S/Key is used
- 20070424 OpenSSH - System Account Enumeration if S/Key is used
- 20070424 OpenSSH - System Account Enumeration if S/Key is used
- 2631
- 2631
- 34600
- 34600
- 23601
- 23601
- openssh-challenge-information-disclosure(33794)
- openssh-challenge-information-disclosure(33794)
- https://security.netapp.com/advisory/ntap-20191107-0003/
- https://security.netapp.com/advisory/ntap-20191107-0003/
Modified: 2024-11-21
CVE-2007-4752
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
- http://bugs.gentoo.org/show_bug.cgi?id=191321
- http://bugs.gentoo.org/show_bug.cgi?id=191321
- http://docs.info.apple.com/article.html?artnum=307562
- http://docs.info.apple.com/article.html?artnum=307562
- HPSBUX02287
- HPSBUX02287
- SSRT071485
- SSRT071485
- APPLE-SA-2008-03-18
- APPLE-SA-2008-03-18
- SUSE-SR:2007:022
- SUSE-SR:2007:022
- 27399
- 27399
- 29420
- 29420
- 30249
- 30249
- 31575
- 31575
- 32241
- 32241
- GLSA-200711-02
- GLSA-200711-02
- 3126
- 3126
- http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm
- DSA-1576
- DSA-1576
- MDKSA-2007:236
- MDKSA-2007:236
- http://www.openssh.com/txt/release-4.7
- http://www.openssh.com/txt/release-4.7
- RHSA-2008:0855
- RHSA-2008:0855
- 20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass
- 20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass
- 20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges
- 20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges
- 25628
- 25628
- USN-566-1
- USN-566-1
- ADV-2007-3156
- ADV-2007-3156
- ADV-2008-0924
- ADV-2008-0924
- ADV-2008-2821
- ADV-2008-2821
- https://bugzilla.redhat.com/show_bug.cgi?id=280471
- https://bugzilla.redhat.com/show_bug.cgi?id=280471
- openssh-x11cookie-privilege-escalation(36637)
- openssh-x11cookie-privilege-escalation(36637)
- https://issues.rpath.com/browse/RPL-1706
- https://issues.rpath.com/browse/RPL-1706
- oval:org.mitre.oval:def:10809
- oval:org.mitre.oval:def:10809
- oval:org.mitre.oval:def:5599
- oval:org.mitre.oval:def:5599
- FEDORA-2007-715
- FEDORA-2007-715
Modified: 2024-11-21
CVE-2008-1483
OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
- NetBSD-SA2008-005
- NetBSD-SA2008-005
- http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
- http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011
- HPSBUX02337
- HPSBUX02337
- SSRT080072
- SSRT080072
- APPLE-SA-2008-09-15
- APPLE-SA-2008-09-15
- SUSE-SR:2008:009
- SUSE-SR:2008:009
- 29522
- 29522
- 29537
- 29537
- 29554
- 29554
- 29626
- 29626
- 29676
- 29676
- 29683
- 29683
- 29686
- 29686
- 29721
- 29721
- 29735
- 29735
- 29873
- 29873
- 29939
- 29939
- 30086
- 30086
- 30230
- 30230
- 30249
- 30249
- 30347
- 30347
- 30361
- 30361
- 31531
- 31531
- 31882
- 31882
- FreeBSD-SA-08:05
- FreeBSD-SA-08:05
- http://sourceforge.net/project/shownotes.php?release_id=590180&group_id=69227
- http://sourceforge.net/project/shownotes.php?release_id=590180&group_id=69227
- 237444
- 237444
- 1019235
- 1019235
- http://support.attachmate.com/techdocs/2374.html
- http://support.attachmate.com/techdocs/2374.html
- http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm
- 20130220 OpenSSH Forwarded X Connection Session Hijack Vulnerability
- 20130220 OpenSSH Forwarded X Connection Session Hijack Vulnerability
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0120
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0120
- DSA-1576
- DSA-1576
- GLSA-200804-03
- GLSA-200804-03
- [security-announce] 20080403 Globus Security Advisory 2008-01: GSI-OpenSSH vulnerability
- [security-announce] 20080403 Globus Security Advisory 2008-01: GSI-OpenSSH vulnerability
- MDVSA-2008:078
- MDVSA-2008:078
- 20080325 rPSA-2008-0120-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20080325 rPSA-2008-0120-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 28444
- 28444
- 1019707
- 1019707
- SSA:2008-095-01
- SSA:2008-095-01
- TA08-260A
- TA08-260A
- ADV-2008-0994
- ADV-2008-0994
- ADV-2008-1123
- ADV-2008-1123
- ADV-2008-1124
- ADV-2008-1124
- ADV-2008-1448
- ADV-2008-1448
- ADV-2008-1526
- ADV-2008-1526
- ADV-2008-1624
- ADV-2008-1624
- ADV-2008-1630
- ADV-2008-1630
- ADV-2008-2396
- ADV-2008-2396
- ADV-2008-2584
- ADV-2008-2584
- openssh-sshd-session-hijacking(41438)
- openssh-sshd-session-hijacking(41438)
- https://issues.rpath.com/browse/RPL-2397
- https://issues.rpath.com/browse/RPL-2397
- oval:org.mitre.oval:def:6085
- oval:org.mitre.oval:def:6085
- USN-597-1
- USN-597-1
Modified: 2024-11-21
CVE-2008-1657
OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
- NetBSD-SA2008-005
- NetBSD-SA2008-005
- http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
- http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
- APPLE-SA-2008-09-15
- APPLE-SA-2008-09-15
- SUSE-SR:2008:009
- SUSE-SR:2008:009
- 29602
- 29602
- 29609
- 29609
- 29683
- 29683
- 29693
- 29693
- 29735
- 29735
- 29939
- 29939
- 30361
- 30361
- 31531
- 31531
- 31882
- 31882
- 32080
- 32080
- 32110
- 32110
- http://support.attachmate.com/techdocs/2374.html
- http://support.attachmate.com/techdocs/2374.html
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0139
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0139
- GLSA-200804-03
- GLSA-200804-03
- MDVSA-2008:098
- MDVSA-2008:098
- [4.3] 001: SECURITY FIX: March 30, 2008
- [4.3] 001: SECURITY FIX: March 30, 2008
- http://www.openssh.com/txt/release-4.9
- http://www.openssh.com/txt/release-4.9
- 20080404 rPSA-2008-0139-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 20080404 rPSA-2008-0139-1 gnome-ssh-askpass openssh openssh-client openssh-server
- 28531
- 28531
- 1019733
- 1019733
- USN-649-1
- USN-649-1
- TA08-260A
- TA08-260A
- ADV-2008-1035
- ADV-2008-1035
- ADV-2008-1624
- ADV-2008-1624
- ADV-2008-2396
- ADV-2008-2396
- ADV-2008-2584
- ADV-2008-2584
- openssh-forcecommand-command-execution(41549)
- openssh-forcecommand-command-execution(41549)
- https://issues.rpath.com/browse/RPL-2419
- https://issues.rpath.com/browse/RPL-2419
Modified: 2024-11-21
CVE-2008-3259
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
- http://openssh.com/security.html
- http://openssh.com/security.html
- 31179
- 31179
- http://www.openssh.com/txt/release-5.1
- http://www.openssh.com/txt/release-5.1
- 30339
- 30339
- 1020537
- 1020537
- ADV-2008-2148
- ADV-2008-2148
- openssh-x11forwarding-info-disclosure(43940)
- openssh-x11forwarding-info-disclosure(43940)
Modified: 2024-11-21
CVE-2008-5161
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
- http://isc.sans.org/diary.html?storyid=5366
- http://isc.sans.org/diary.html?storyid=5366
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- APPLE-SA-2009-11-09-1
- APPLE-SA-2009-11-09-1
- HPSBMA02447
- HPSBMA02447
- SSRT090062
- SSRT090062
- http://openssh.org/txt/cbc.adv
- http://openssh.org/txt/cbc.adv
- 49872
- 49872
- 50035
- 50035
- 50036
- 50036
- RHSA-2009:1287
- RHSA-2009:1287
- 32740
- 32740
- 32760
- 32760
- 32833
- 32833
- 33121
- 33121
- 33308
- 33308
- 34857
- 34857
- 36558
- 36558
- 247186
- 247186
- http://support.apple.com/kb/HT3937
- http://support.apple.com/kb/HT3937
- http://support.attachmate.com/techdocs/2398.html
- http://support.attachmate.com/techdocs/2398.html
- http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
- http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
- http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
- VU#958563
- VU#958563
- http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
- http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
- 20081121 OpenSSH security advisory: cbc.adv
- 20081121 OpenSSH security advisory: cbc.adv
- 20081123 Revised: OpenSSH security advisory: cbc.adv
- 20081123 Revised: OpenSSH security advisory: cbc.adv
- 32319
- 32319
- 1021235
- 1021235
- 1021236
- 1021236
- 1021382
- 1021382
- http://www.ssh.com/company/news/article/953/
- http://www.ssh.com/company/news/article/953/
- ADV-2008-3172
- ADV-2008-3172
- ADV-2008-3173
- ADV-2008-3173
- ADV-2008-3409
- ADV-2008-3409
- ADV-2009-1135
- ADV-2009-1135
- ADV-2009-3184
- ADV-2009-3184
- openssh-sshtectia-cbc-info-disclosure(46620)
- openssh-sshtectia-cbc-info-disclosure(46620)
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://kc.mcafee.com/corporate/index?page=content&id=SB10106
- https://kc.mcafee.com/corporate/index?page=content&id=SB10106
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- oval:org.mitre.oval:def:11279
- oval:org.mitre.oval:def:11279
Modified: 2024-11-21
CVE-2010-4478
OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf
- http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h
- https://bugzilla.redhat.com/show_bug.cgi?id=659297
- https://bugzilla.redhat.com/show_bug.cgi?id=659297
- https://github.com/seb-m/jpake
- https://github.com/seb-m/jpake
- oval:org.mitre.oval:def:12338
- oval:org.mitre.oval:def:12338
Modified: 2024-11-21
CVE-2010-5107
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
- HPSBMU03409
- RHSA-2013:1591
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89
- [oss-security] 20130206 Re: CVE id request: openssh?
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 58162
- https://bugzilla.redhat.com/show_bug.cgi?id=908707
- oval:org.mitre.oval:def:19515
- oval:org.mitre.oval:def:19595
- HPSBMU03409
- oval:org.mitre.oval:def:19595
- oval:org.mitre.oval:def:19515
- https://bugzilla.redhat.com/show_bug.cgi?id=908707
- 58162
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- [oss-security] 20130206 Re: CVE id request: openssh?
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234
- RHSA-2013:1591
Modified: 2024-11-21
CVE-2011-0539
The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
- HPSBMA02658
- SSRT100413
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- 43181
- 44269
- http://www.openssh.com/txt/legacy-cert.adv
- [oss-security] 20110204 Re: [vendor-sec] OpenSSH security advisory: legacy certificate signing in 5.6/5.7
- 46155
- 1025028
- ADV-2011-0284
- openssh-certificate-info-disclosure(65163)
- HPSBMA02658
- openssh-certificate-info-disclosure(65163)
- ADV-2011-0284
- 1025028
- 46155
- [oss-security] 20110204 Re: [vendor-sec] OpenSSH security advisory: legacy certificate signing in 5.6/5.7
- http://www.openssh.com/txt/legacy-cert.adv
- 44269
- 43181
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- SSRT100413
Modified: 2024-11-21
CVE-2011-4327
ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
Modified: 2024-11-21
CVE-2011-5000
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
Modified: 2024-11-21
CVE-2012-0814
The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- [oss-security] 20120126 CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- [oss-security] 20120126 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- [oss-security] 20120126 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- [oss-security] 20120127 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- 78706
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3Br2=1.54
- 51702
- opensshserver-commands-info-disc(72756)
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445
- opensshserver-commands-info-disc(72756)
- 51702
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3Br2=1.54
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c
- 78706
- [oss-security] 20120127 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- [oss-security] 20120126 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- [oss-security] 20120126 Re: CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- [oss-security] 20120126 CVE Request: Debian (others?) openssh-server: Forced Command handling leaks private information to ssh clients
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
Modified: 2024-11-21
CVE-2013-4548
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
Modified: 2024-11-21
CVE-2014-1692
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
- HPSBUX03188
- HPSBUX03188
- SSRT101487
- SSRT101487
- HPSBMU03409
- HPSBMU03409
- [oss-security] 20140129 Re: OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- [oss-security] 20140129 Re: OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- [oss-security] 20140128 OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- [oss-security] 20140128 OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- 102611
- 102611
- 60184
- 60184
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10
- 65230
- 65230
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637
- openssh-cve20141692-code-exec(90819)
- openssh-cve20141692-code-exec(90819)
Modified: 2024-11-21
CVE-2014-2532
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- FEDORA-2014-6569
- FEDORA-2014-6569
- FEDORA-2014-6380
- FEDORA-2014-6380
- HPSBUX03188
- HPSBUX03188
- SSRT101487
- SSRT101487
- [security-announce] 20140315 Announce: OpenSSH 6.6 released
- [security-announce] 20140315 Announce: OpenSSH 6.6 released
- RHSA-2014:1552
- RHSA-2014:1552
- 57488
- 57488
- 57574
- 57574
- 59313
- 59313
- 59855
- 59855
- DSA-2894
- DSA-2894
- MDVSA-2014:068
- MDVSA-2014:068
- MDVSA-2015:095
- MDVSA-2015:095
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- 66355
- 66355
- 1029925
- 1029925
- USN-2155-1
- USN-2155-1
- openssh-cve20142532-sec-bypass(91986)
- openssh-cve20142532-sec-bypass(91986)
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
Modified: 2024-11-21
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
- http://advisories.mageia.org/MGASA-2014-0166.html
- http://advisories.mageia.org/MGASA-2014-0166.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- FEDORA-2014-6569
- FEDORA-2014-6569
- FEDORA-2014-6380
- FEDORA-2014-6380
- HPSBUX03188
- HPSBUX03188
- SSRT101487
- SSRT101487
- [oss-security] 20140326 CVE request: openssh client does not check SSHFP if server offers certificate
- [oss-security] 20140326 CVE request: openssh client does not check SSHFP if server offers certificate
- RHSA-2014:1552
- RHSA-2014:1552
- RHSA-2015:0425
- RHSA-2015:0425
- 59855
- 59855
- DSA-2894
- DSA-2894
- MDVSA-2014:068
- MDVSA-2014:068
- MDVSA-2015:095
- MDVSA-2015:095
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 66459
- 66459
- USN-2164-1
- USN-2164-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513
Modified: 2024-11-21
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
- SUSE-SU-2015:1581
- SUSE-SU-2015:1581
- [oss-security] 20150701 Re: CVE Request: two security issues in openSSH 6.9
- [oss-security] 20150701 Re: CVE Request: two security issues in openSSH 6.9
- RHSA-2016:0741
- RHSA-2016:0741
- http://www.openssh.com/txt/release-6.9
- http://www.openssh.com/txt/release-6.9
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 75525
- 75525
- 1032797
- 1032797
- USN-2710-1
- USN-2710-1
- USN-2710-2
- USN-2710-2
- https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
- https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201512-04
- GLSA-201512-04
- https://security.netapp.com/advisory/ntap-20181023-0001/
- https://security.netapp.com/advisory/ntap-20181023-0001/
Modified: 2024-11-21
CVE-2015-5600
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10697
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10697
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- FEDORA-2015-13469
- FEDORA-2015-13469
- FEDORA-2015-11981
- FEDORA-2015-11981
- SUSE-SU-2015:1581
- SUSE-SU-2015:1581
- [oss-security] 20150723 Re: CVE Request for OpenSSH vulnerability - authentication limits bypass
- [oss-security] 20150723 Re: CVE Request for OpenSSH vulnerability - authentication limits bypass
- RHSA-2016:0466
- RHSA-2016:0466
- 20150717 OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)
- 20150717 OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 75990
- 75990
- 91787
- 91787
- 92012
- 92012
- 1032988
- 1032988
- USN-2710-1
- USN-2710-1
- USN-2710-2
- USN-2710-2
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128992
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128992
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://kc.mcafee.com/corporate/index?page=content&id=SB10136
- https://kc.mcafee.com/corporate/index?page=content&id=SB10136
- https://kc.mcafee.com/corporate/index?page=content&id=SB10157
- https://kc.mcafee.com/corporate/index?page=content&id=SB10157
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201512-04
- GLSA-201512-04
- https://security.netapp.com/advisory/ntap-20151106-0001/
- https://security.netapp.com/advisory/ntap-20151106-0001/
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12
- https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12
Modified: 2024-11-21
CVE-2015-6563
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
- APPLE-SA-2015-10-21-4
- APPLE-SA-2015-10-21-4
- FEDORA-2015-13469
- FEDORA-2015-13469
- SUSE-SU-2015:1581
- SUSE-SU-2015:1581
- RHSA-2016:0741
- RHSA-2016:0741
- 20150813 BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities
- 20150813 BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities
- http://www.openssh.com/txt/release-7.0
- http://www.openssh.com/txt/release-7.0
- [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
- [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76317
- 76317
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssh/openssh-portable/commit/d4697fe9a28dab7255c60433e4dd23cf7fce8a8b
- https://github.com/openssh/openssh-portable/commit/d4697fe9a28dab7255c60433e4dd23cf7fce8a8b
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201512-04
- GLSA-201512-04
- https://security.netapp.com/advisory/ntap-20180201-0002/
- https://security.netapp.com/advisory/ntap-20180201-0002/
- https://support.apple.com/HT205375
- https://support.apple.com/HT205375
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-766
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-766
Modified: 2024-11-21
CVE-2015-6564
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
- FEDORA-2015-13469
- FEDORA-2015-13469
- SUSE-SU-2015:1581
- SUSE-SU-2015:1581
- RHSA-2016:0741
- RHSA-2016:0741
- 20150813 BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities
- 20150813 BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities
- http://www.openssh.com/txt/release-7.0
- http://www.openssh.com/txt/release-7.0
- [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
- [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76317
- 76317
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssh/openssh-portable/commit/5e75f5198769056089fb06c4d738ab0e5abc66f7
- https://github.com/openssh/openssh-portable/commit/5e75f5198769056089fb06c4d738ab0e5abc66f7
- https://kc.mcafee.com/corporate/index?page=content&id=SB10136
- https://kc.mcafee.com/corporate/index?page=content&id=SB10136
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201512-04
- GLSA-201512-04
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-764
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-764
Modified: 2024-11-21
CVE-2015-6565
sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.
- [oss-security] 20170126 Re: OpenSSH: CVE-2015-6565 (pty issue in 6.8-6.9) can lead to local privesc on Linux
- [oss-security] 20170126 Re: OpenSSH: CVE-2015-6565 (pty issue in 6.8-6.9) can lead to local privesc on Linux
- http://www.openssh.com/txt/release-7.0
- http://www.openssh.com/txt/release-7.0
- [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
- [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
- 76497
- 76497
- 1033917
- 1033917
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- GLSA-201512-04
- GLSA-201512-04
- 41173
- 41173
Modified: 2024-11-21
CVE-2015-8325
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
- RHSA-2016:2588
- RHSA-2016:2588
- RHSA-2017:0641
- RHSA-2017:0641
- DSA-3550
- DSA-3550
- 86187
- 86187
- 1036487
- 1036487
- https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
- https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
- https://bugzilla.redhat.com/show_bug.cgi?id=1328012
- https://bugzilla.redhat.com/show_bug.cgi?id=1328012
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
- GLSA-201612-18
- GLSA-201612-18
- https://security.netapp.com/advisory/ntap-20180628-0001/
- https://security.netapp.com/advisory/ntap-20180628-0001/
- https://security-tracker.debian.org/tracker/CVE-2015-8325
- https://security-tracker.debian.org/tracker/CVE-2015-8325
Modified: 2024-11-21
CVE-2016-0777
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-67c6ef0d4f
- FEDORA-2016-67c6ef0d4f
- FEDORA-2016-c330264861
- FEDORA-2016-c330264861
- FEDORA-2016-4556904561
- FEDORA-2016-4556904561
- SUSE-SU-2016:0117
- SUSE-SU-2016:0117
- SUSE-SU-2016:0118
- SUSE-SU-2016:0118
- SUSE-SU-2016:0119
- SUSE-SU-2016:0119
- SUSE-SU-2016:0120
- SUSE-SU-2016:0120
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0128
- openSUSE-SU-2016:0128
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- DSA-3446
- DSA-3446
- http://www.openssh.com/txt/release-7.1p2
- http://www.openssh.com/txt/release-7.1p2
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 80695
- 80695
- 1034671
- 1034671
- USN-2869-1
- USN-2869-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://bto.bluecoat.com/security-advisory/sa109
- https://bto.bluecoat.com/security-advisory/sa109
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- FreeBSD-SA-16:07
- FreeBSD-SA-16:07
- GLSA-201601-01
- GLSA-201601-01
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Modified: 2024-11-21
CVE-2016-0778
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-4556904561
- FEDORA-2016-4556904561
- SUSE-SU-2016:0117
- SUSE-SU-2016:0117
- SUSE-SU-2016:0118
- SUSE-SU-2016:0118
- SUSE-SU-2016:0119
- SUSE-SU-2016:0119
- SUSE-SU-2016:0120
- SUSE-SU-2016:0120
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0128
- openSUSE-SU-2016:0128
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- DSA-3446
- DSA-3446
- http://www.openssh.com/txt/release-7.1p2
- http://www.openssh.com/txt/release-7.1p2
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 80698
- 80698
- 1034671
- 1034671
- USN-2869-1
- USN-2869-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://bto.bluecoat.com/security-advisory/sa109
- https://bto.bluecoat.com/security-advisory/sa109
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- GLSA-201601-01
- GLSA-201601-01
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Modified: 2024-11-21
CVE-2016-10009
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
- http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html
- http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html
- http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
- 20230719 CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- 20230719 CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- [oss-security] 20230719 CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- [oss-security] 20230719 CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- [oss-security] 20230719 Re: CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- [oss-security] 20230719 Re: CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- 94968
- 94968
- 1037490
- 1037490
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- RHSA-2017:2029
- RHSA-2017:2029
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1009
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1009
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openbsd/src/commit/9476ce1dd37d3c3218d5640b74c34c65e5f4efe5
- https://github.com/openbsd/src/commit/9476ce1dd37d3c3218d5640b74c34c65e5f4efe5
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- FreeBSD-SA-17:01
- FreeBSD-SA-17:01
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- USN-3538-1
- USN-3538-1
- 40963
- 40963
- https://www.openssh.com/txt/release-7.4
- https://www.openssh.com/txt/release-7.4
Modified: 2024-11-21
CVE-2016-10010
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
- http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html
- http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- 94972
- 94972
- 1037490
- 1037490
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1010
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1010
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openbsd/src/commit/c76fac666ea038753294f2ac94d310f8adece9ce
- https://github.com/openbsd/src/commit/c76fac666ea038753294f2ac94d310f8adece9ce
- FreeBSD-SA-17:01
- FreeBSD-SA-17:01
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- 40962
- 40962
- https://www.openssh.com/txt/release-7.4
- https://www.openssh.com/txt/release-7.4
Modified: 2024-11-21
CVE-2016-10011
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- 94977
- 94977
- 1037490
- 1037490
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- RHSA-2017:2029
- RHSA-2017:2029
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
- https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
- https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- https://www.openssh.com/txt/release-7.4
- https://www.openssh.com/txt/release-7.4
Modified: 2024-11-21
CVE-2016-10012
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- [oss-security] 20161219 Announce: OpenSSH 7.4 released
- 94975
- 94975
- 1037490
- 1037490
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
- RHSA-2017:2029
- RHSA-2017:2029
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openbsd/src/commit/3095060f479b86288e31c79ecbc5131a66bcd2f9
- https://github.com/openbsd/src/commit/3095060f479b86288e31c79ecbc5131a66bcd2f9
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://security.netapp.com/advisory/ntap-20171130-0002/
- https://support.f5.com/csp/article/K62201745?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K62201745?utm_source=f5support&%3Butm_medium=RSS
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
- https://www.openssh.com/txt/release-7.4
- https://www.openssh.com/txt/release-7.4
Modified: 2024-11-21
CVE-2016-10708
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
- http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html
- http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html
- 102780
- 102780
- https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737
- https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737
- https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1257-1] openssh security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1257-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- https://security.netapp.com/advisory/ntap-20180423-0003/
- https://security.netapp.com/advisory/ntap-20180423-0003/
- https://support.f5.com/csp/article/K32485746?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K32485746?utm_source=f5support&%3Butm_medium=RSS
- USN-3809-1
- USN-3809-1
- https://www.openssh.com/releasenotes.html
- https://www.openssh.com/releasenotes.html
Modified: 2024-11-21
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-c330264861
- FEDORA-2016-c330264861
- FEDORA-2016-4556904561
- FEDORA-2016-4556904561
- http://www.openssh.com/txt/release-7.1p2
- http://www.openssh.com/txt/release-7.1p2
- 81293
- 81293
- https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
- https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0
- https://bto.bluecoat.com/security-advisory/sa109
- https://bto.bluecoat.com/security-advisory/sa109
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Modified: 2024-11-21
CVE-2016-1908
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
- [oss-security] 20160115 Re: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- [oss-security] 20160115 Re: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- RHSA-2016:0465
- RHSA-2016:0465
- RHSA-2016:0741
- RHSA-2016:0741
- http://www.openssh.com/txt/release-7.2
- http://www.openssh.com/txt/release-7.2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 84427
- 84427
- 1034705
- 1034705
- https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
- https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
- https://bugzilla.redhat.com/show_bug.cgi?id=1298741
- https://bugzilla.redhat.com/show_bug.cgi?id=1298741
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201612-18
- GLSA-201612-18
Modified: 2024-11-21
CVE-2016-3115
Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
- FEDORA-2016-fc1cc33e05
- FEDORA-2016-fc1cc33e05
- FEDORA-2016-188267b485
- FEDORA-2016-188267b485
- FEDORA-2016-bb59db3c86
- FEDORA-2016-bb59db3c86
- FEDORA-2016-0bcab055a7
- FEDORA-2016-0bcab055a7
- FEDORA-2016-d339d610c1
- FEDORA-2016-d339d610c1
- FEDORA-2016-08e5803496
- FEDORA-2016-08e5803496
- http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html
- http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html
- RHSA-2016:0465
- RHSA-2016:0465
- RHSA-2016:0466
- RHSA-2016:0466
- 20160314 CVE-2016-3115 - OpenSSH <=7.2p1 xauth injection
- 20160314 CVE-2016-3115 - OpenSSH <=7.2p1 xauth injection
- 20160314 CVE-2016-3116 - Dropbear SSH xauth injection
- 20160314 CVE-2016-3116 - Dropbear SSH xauth injection
- http://www.openssh.com/txt/x11fwd.adv
- http://www.openssh.com/txt/x11fwd.adv
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 84314
- 84314
- 1035249
- 1035249
- https://bto.bluecoat.com/security-advisory/sa121
- https://bto.bluecoat.com/security-advisory/sa121
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201612-18
- GLSA-201612-18
- 39569
- 39569
- FreeBSD-SA-16:14
- FreeBSD-SA-16:14
Modified: 2024-11-21
CVE-2016-6210
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
- 20160714 opensshd - user enumeration
- 20160714 opensshd - user enumeration
- DSA-3626
- DSA-3626
- 91812
- 91812
- 1036319
- 1036319
- RHSA-2017:2029
- RHSA-2017:2029
- RHSA-2017:2563
- RHSA-2017:2563
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- GLSA-201612-18
- GLSA-201612-18
- https://security.netapp.com/advisory/ntap-20190206-0001/
- https://security.netapp.com/advisory/ntap-20190206-0001/
- 40113
- 40113
- 40136
- 40136
- https://www.openssh.com/txt/release-7.3
- https://www.openssh.com/txt/release-7.3
Modified: 2024-11-21
CVE-2016-6515
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
- [oss-security] 20160801 Announce: OpenSSH 7.3 released
- [oss-security] 20160801 Announce: OpenSSH 7.3 released
- http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html
- http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 92212
- 92212
- 1036487
- 1036487
- RHSA-2017:2029
- RHSA-2017:2029
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
- https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97
- https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- FEDORA-2016-4a3debc3a6
- FEDORA-2016-4a3debc3a6
- FreeBSD-SA-17:06
- FreeBSD-SA-17:06
- https://security.netapp.com/advisory/ntap-20171130-0003/
- https://security.netapp.com/advisory/ntap-20171130-0003/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us
- 40888
- 40888
Modified: 2024-11-21
CVE-2016-8858
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
- http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
- [oss-security] 20161019 CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSH
- [oss-security] 20161019 CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSH
- [oss-security] 20161020 Re: Re: CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSH
- [oss-security] 20161020 Re: Re: CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSH
- 93776
- 93776
- 1037057
- 1037057
- https://bugzilla.redhat.com/show_bug.cgi?id=1384860
- https://bugzilla.redhat.com/show_bug.cgi?id=1384860
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/013_ssh_kexinit.patch.sig
- https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad
- https://github.com/openssh/openssh-portable/commit/ec165c392ca54317dbe3064a8c200de6531e89ad
- FreeBSD-SA-16:33
- FreeBSD-SA-16:33
- GLSA-201612-18
- GLSA-201612-18
- https://security.netapp.com/advisory/ntap-20180201-0001/
- https://security.netapp.com/advisory/ntap-20180201-0001/
Modified: 2024-11-21
CVE-2017-15906
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
- 101552
- 101552
- RHSA-2018:0980
- RHSA-2018:0980
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19
- https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- [debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update
- GLSA-201801-05
- GLSA-201801-05
- https://security.netapp.com/advisory/ntap-20180423-0004/
- https://security.netapp.com/advisory/ntap-20180423-0004/
- https://www.openssh.com/txt/release-7.6
- https://www.openssh.com/txt/release-7.6
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2018-15473
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
- http://www.openwall.com/lists/oss-security/2018/08/15/5
- http://www.openwall.com/lists/oss-security/2018/08/15/5
- 105140
- 105140
- 1041487
- 1041487
- RHSA-2019:0711
- RHSA-2019:0711
- RHSA-2019:2143
- RHSA-2019:2143
- https://bugs.debian.org/906236
- https://bugs.debian.org/906236
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
- https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
- [debian-lts-announce] 20180821 [SECURITY] [DLA-1474-1] openssh security update
- [debian-lts-announce] 20180821 [SECURITY] [DLA-1474-1] openssh security update
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011
- GLSA-201810-03
- GLSA-201810-03
- https://security.netapp.com/advisory/ntap-20181101-0001/
- https://security.netapp.com/advisory/ntap-20181101-0001/
- USN-3809-1
- USN-3809-1
- DSA-4280
- DSA-4280
- 45210
- 45210
- 45233
- 45233
- 45939
- 45939
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2018-15919
Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
Modified: 2024-11-21
CVE-2018-20685
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
- 106531
- 106531
- RHSA-2019:3702
- RHSA-2019:3702
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
- https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
- https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update
- GLSA-201903-16
- GLSA-201903-16
- GLSA-202007-53
- GLSA-202007-53
- https://security.netapp.com/advisory/ntap-20190215-0001/
- https://security.netapp.com/advisory/ntap-20190215-0001/
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- USN-3885-1
- USN-3885-1
- DSA-4387
- DSA-4387
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Modified: 2024-11-21
CVE-2019-16905
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
- https://0day.life/exploits/0day-1009.html
- https://0day.life/exploits/0day-1009.html
- https://bugzilla.suse.com/show_bug.cgi?id=1153537
- https://bugzilla.suse.com/show_bug.cgi?id=1153537
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c.diff?r1=1.5&r2=1.6&f=h
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c.diff?r1=1.5&r2=1.6&f=h
- GLSA-201911-01
- GLSA-201911-01
- https://security.netapp.com/advisory/ntap-20191024-0003/
- https://security.netapp.com/advisory/ntap-20191024-0003/
- https://ssd-disclosure.com/archives/4033/ssd-advisory-openssh-pre-auth-xmss-integer-overflow
- https://ssd-disclosure.com/archives/4033/ssd-advisory-openssh-pre-auth-xmss-integer-overflow
- https://www.openssh.com/releasenotes.html
- https://www.openssh.com/releasenotes.html
- https://www.openwall.com/lists/oss-security/2019/10/09/1
- https://www.openwall.com/lists/oss-security/2019/10/09/1
Modified: 2024-11-21
CVE-2019-6109
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
- openSUSE-SU-2019:1602
- openSUSE-SU-2019:1602
- RHSA-2019:3702
- RHSA-2019:3702
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update
- FEDORA-2019-0f4190cdb0
- FEDORA-2019-0f4190cdb0
- GLSA-201903-16
- GLSA-201903-16
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- USN-3885-1
- USN-3885-1
- DSA-4387
- DSA-4387
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Modified: 2024-11-21
CVE-2019-6110
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- GLSA-201903-16
- GLSA-201903-16
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- 46193
- 46193
Modified: 2024-11-21
CVE-2019-6111
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
- openSUSE-SU-2019:1602
- openSUSE-SU-2019:1602
- [oss-security] 20190417 Announce: OpenSSH 8.0 released
- [oss-security] 20190417 Announce: OpenSSH 8.0 released
- [oss-security] 20220802 CVE-2022-29154: Rsync client-side arbitrary file write vulnerability.
- [oss-security] 20220802 CVE-2022-29154: Rsync client-side arbitrary file write vulnerability.
- 106741
- 106741
- RHSA-2019:3702
- RHSA-2019:3702
- https://bugzilla.redhat.com/show_bug.cgi?id=1677794
- https://bugzilla.redhat.com/show_bug.cgi?id=1677794
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- [mina-dev] 20190620 [jira] [Created] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190620 [jira] [Created] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190623 [jira] [Comment Edited] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190623 [jira] [Comment Edited] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190820 [jira] [Resolved] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190820 [jira] [Resolved] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190623 [jira] [Commented] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [mina-dev] 20190623 [jira] [Commented] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update
- FEDORA-2019-0f4190cdb0
- FEDORA-2019-0f4190cdb0
- GLSA-201903-16
- GLSA-201903-16
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- USN-3885-1
- USN-3885-1
- USN-3885-2
- USN-3885-2
- DSA-4387
- DSA-4387
- 46193
- 46193
- FreeBSD-EN-19:10
- FreeBSD-EN-19:10
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Modified: 2024-11-21
CVE-2020-12062
The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.
- https://github.com/openssh/openssh-portable/commit/955854cafca88e0cdcd3d09ca1ad4ada465364a1
- https://github.com/openssh/openssh-portable/commit/aad87b88fc2536b1ea023213729aaf4eaabe1894
- https://www.openssh.com/txt/release-8.3
- https://www.openwall.com/lists/oss-security/2020/05/27/1
- https://github.com/openssh/openssh-portable/commit/955854cafca88e0cdcd3d09ca1ad4ada465364a1
- https://www.openwall.com/lists/oss-security/2020/05/27/1
- https://www.openssh.com/txt/release-8.3
- https://github.com/openssh/openssh-portable/commit/aad87b88fc2536b1ea023213729aaf4eaabe1894
Modified: 2024-11-21
CVE-2020-14145
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
- [oss-security] 20201202 Some mitigation for openssh CVE-2020-14145
- [oss-security] 20201202 Some mitigation for openssh CVE-2020-14145
- https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
- https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
- https://docs.ssh-mitm.at/CVE-2020-14145.html
- https://docs.ssh-mitm.at/CVE-2020-14145.html
- https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
- https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
- https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
- https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
- GLSA-202105-35
- GLSA-202105-35
- https://security.netapp.com/advisory/ntap-20200709-0004/
- https://security.netapp.com/advisory/ntap-20200709-0004/
- https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
- https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
Modified: 2024-11-21
CVE-2020-15778
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
- https://access.redhat.com/errata/RHSA-2024:3166
- https://access.redhat.com/errata/RHSA-2024:3166
- https://github.com/cpandya2909/CVE-2020-15778/
- https://github.com/cpandya2909/CVE-2020-15778/
- https://news.ycombinator.com/item?id=25005567
- https://news.ycombinator.com/item?id=25005567
- GLSA-202212-06
- GLSA-202212-06
- https://security.netapp.com/advisory/ntap-20200731-0007/
- https://security.netapp.com/advisory/ntap-20200731-0007/
- https://www.openssh.com/security.html
- https://www.openssh.com/security.html
Modified: 2024-11-21
CVE-2021-28041
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
- https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db
- https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db
- FEDORA-2021-1d3698089d
- FEDORA-2021-1d3698089d
- FEDORA-2021-f68a5a75ba
- FEDORA-2021-f68a5a75ba
- GLSA-202105-35
- GLSA-202105-35
- https://security.netapp.com/advisory/ntap-20210416-0002/
- https://security.netapp.com/advisory/ntap-20210416-0002/
- https://www.openssh.com/security.html
- https://www.openssh.com/security.html
- https://www.openssh.com/txt/release-8.5
- https://www.openssh.com/txt/release-8.5
- https://www.openwall.com/lists/oss-security/2021/03/03/1
- https://www.openwall.com/lists/oss-security/2021/03/03/1
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
- [oss-security] 20230213 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230213 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230222 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230222 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230222 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230222 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230223 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230223 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230306 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230306 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230309 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- [oss-security] 20230309 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
- https://bugzilla.mindrot.org/show_bug.cgi?id=3522
- https://bugzilla.mindrot.org/show_bug.cgi?id=3522
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig
- https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946
- https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946
- https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
- https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
- FEDORA-2023-123647648e
- FEDORA-2023-123647648e
- FEDORA-2023-1176c8b10c
- FEDORA-2023-1176c8b10c
- https://news.ycombinator.com/item?id=34711565
- https://news.ycombinator.com/item?id=34711565
- GLSA-202307-01
- GLSA-202307-01
- https://security.netapp.com/advisory/ntap-20230309-0003/
- https://security.netapp.com/advisory/ntap-20230309-0003/
- https://www.openwall.com/lists/oss-security/2023/02/02/2
- https://www.openwall.com/lists/oss-security/2023/02/02/2
Modified: 2024-11-21
CVE-2023-28531
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
- FEDORA-2024-2aac54ebb7
- GLSA-202307-01
- https://security.netapp.com/advisory/ntap-20230413-0008/
- DSA-5586
- https://www.openwall.com/lists/oss-security/2023/03/15/8
- FEDORA-2024-2aac54ebb7
- https://www.openwall.com/lists/oss-security/2023/03/15/8
- DSA-5586
- https://security.netapp.com/advisory/ntap-20230413-0008/
- GLSA-202307-01
Modified: 2024-11-21
CVE-2023-38408
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
- http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
- [oss-security] 20230719 Re: CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- [oss-security] 20230719 Re: CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
- [oss-security] 20230720 Re: Announce: OpenSSH 9.3p2 released
- [oss-security] 20230720 Re: Announce: OpenSSH 9.3p2 released
- [oss-security] 20230922 Re: illumos (or at least danmcd) membership in the distros list
- [oss-security] 20230922 Re: illumos (or at least danmcd) membership in the distros list
- [oss-security] 20230922 Re: illumos (or at least danmcd) membership in the distros list
- [oss-security] 20230922 Re: illumos (or at least danmcd) membership in the distros list
- https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
- https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
- https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8
- https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8
- https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d
- https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d
- https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca
- https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca
- [debian-lts-announce] 20230817 [SECURITY] [DLA 3532-1] openssh security update
- [debian-lts-announce] 20230817 [SECURITY] [DLA 3532-1] openssh security update
- FEDORA-2023-79a18e1725
- FEDORA-2023-79a18e1725
- FEDORA-2023-878e04f4ae
- FEDORA-2023-878e04f4ae
- https://news.ycombinator.com/item?id=36790196
- https://news.ycombinator.com/item?id=36790196
- GLSA-202307-01
- GLSA-202307-01
- https://security.netapp.com/advisory/ntap-20230803-0010/
- https://security.netapp.com/advisory/ntap-20230803-0010/
- https://support.apple.com/kb/HT213940
- https://support.apple.com/kb/HT213940
- https://www.openssh.com/security.html
- https://www.openssh.com/security.html
- https://www.openssh.com/txt/release-9.3p2
- https://www.openssh.com/txt/release-9.3p2
- https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt
- https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt
- https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408
- https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408
Modified: 2024-12-02
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
- http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
- http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
- 20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4
- 20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4
- [oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
- [oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
- [oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
- [oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
- [oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
- [oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
- [oss-security] 20240306 Multiple vulnerabilities in Jenkins plugins
- [oss-security] 20240306 Multiple vulnerabilities in Jenkins plugins
- [oss-security] 20240417 Terrapin vulnerability in Jenkins CLI client
- [oss-security] 20240417 Terrapin vulnerability in Jenkins CLI client
- https://access.redhat.com/security/cve/cve-2023-48795
- https://access.redhat.com/security/cve/cve-2023-48795
- https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
- https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
- https://bugs.gentoo.org/920280
- https://bugs.gentoo.org/920280
- https://bugzilla.redhat.com/show_bug.cgi?id=2254210
- https://bugzilla.redhat.com/show_bug.cgi?id=2254210
- https://bugzilla.suse.com/show_bug.cgi?id=1217950
- https://bugzilla.suse.com/show_bug.cgi?id=1217950
- https://crates.io/crates/thrussh/versions
- https://crates.io/crates/thrussh/versions
- https://filezilla-project.org/versions.php
- https://filezilla-project.org/versions.php
- https://forum.netgate.com/topic/184941/terrapin-ssh-attack
- https://forum.netgate.com/topic/184941/terrapin-ssh-attack
- https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
- https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
- https://github.com/advisories/GHSA-45x7-px36-x8w8
- https://github.com/advisories/GHSA-45x7-px36-x8w8
- https://github.com/apache/mina-sshd/issues/445
- https://github.com/apache/mina-sshd/issues/445
- https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
- https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
- https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
- https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
- https://github.com/cyd01/KiTTY/issues/520
- https://github.com/cyd01/KiTTY/issues/520
- https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
- https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
- https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
- https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
- https://github.com/erlang/otp/releases/tag/OTP-26.2.1
- https://github.com/erlang/otp/releases/tag/OTP-26.2.1
- https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
- https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
- https://github.com/hierynomus/sshj/issues/916
- https://github.com/hierynomus/sshj/issues/916
- https://github.com/janmojzis/tinyssh/issues/81
- https://github.com/janmojzis/tinyssh/issues/81
- https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
- https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
- https://github.com/libssh2/libssh2/pull/1291
- https://github.com/libssh2/libssh2/pull/1291
- https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
- https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
- https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
- https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
- https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
- https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
- https://github.com/mwiede/jsch/issues/457
- https://github.com/mwiede/jsch/issues/457
- https://github.com/mwiede/jsch/pull/461
- https://github.com/mwiede/jsch/pull/461
- https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
- https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
- https://github.com/NixOS/nixpkgs/pull/275249
- https://github.com/NixOS/nixpkgs/pull/275249
- https://github.com/openssh/openssh-portable/commits/master
- https://github.com/openssh/openssh-portable/commits/master
- https://github.com/paramiko/paramiko/issues/2337
- https://github.com/paramiko/paramiko/issues/2337
- https://github.com/PowerShell/Win32-OpenSSH/issues/2189
- https://github.com/PowerShell/Win32-OpenSSH/issues/2189
- https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
- https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
- https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/issues/456
- https://github.com/proftpd/proftpd/issues/456
- https://github.com/rapier1/hpn-ssh/releases
- https://github.com/rapier1/hpn-ssh/releases
- https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
- https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
- https://github.com/ronf/asyncssh/tags
- https://github.com/ronf/asyncssh/tags
- https://github.com/ssh-mitm/ssh-mitm/issues/165
- https://github.com/ssh-mitm/ssh-mitm/issues/165
- https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
- https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
- https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
- https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
- https://github.com/warp-tech/russh/releases/tag/v0.40.2
- https://github.com/warp-tech/russh/releases/tag/v0.40.2
- https://gitlab.com/libssh/libssh-mirror/-/tags
- https://gitlab.com/libssh/libssh-mirror/-/tags
- https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
- https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
- https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
- https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
- https://help.panic.com/releasenotes/transmit5/
- https://help.panic.com/releasenotes/transmit5/
- https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
- https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
- [debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update
- [debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update
- [debian-lts-announce] 20240125 [SECURITY] [DLA 3718-1] php-phpseclib security update
- [debian-lts-announce] 20240125 [SECURITY] [DLA 3718-1] php-phpseclib security update
- [debian-lts-announce] 20240125 [SECURITY] [DLA 3719-1] phpseclib security update
- [debian-lts-announce] 20240125 [SECURITY] [DLA 3719-1] phpseclib security update
- [debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update
- [debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3fd1bc9276
- FEDORA-2024-3fd1bc9276
- FEDORA-2023-20feb865d8
- FEDORA-2023-20feb865d8
- FEDORA-2024-06ebb70bdd
- FEDORA-2024-06ebb70bdd
- FEDORA-2023-e77300e4b5
- FEDORA-2023-e77300e4b5
- FEDORA-2024-71c2c6526c
- FEDORA-2024-71c2c6526c
- FEDORA-2024-d946b9ad25
- FEDORA-2024-d946b9ad25
- FEDORA-2024-ae653fb07b
- FEDORA-2024-ae653fb07b
- FEDORA-2023-cb8c606fbb
- FEDORA-2023-cb8c606fbb
- FEDORA-2024-7b08207cdb
- FEDORA-2024-7b08207cdb
- FEDORA-2024-2705241461
- FEDORA-2024-2705241461
- FEDORA-2024-fb32950d11
- FEDORA-2024-fb32950d11
- FEDORA-2023-153404713b
- FEDORA-2023-153404713b
- FEDORA-2024-a53b24023d
- FEDORA-2024-a53b24023d
- FEDORA-2023-55800423a8
- FEDORA-2023-55800423a8
- FEDORA-2023-0733306be9
- FEDORA-2023-0733306be9
- FEDORA-2023-b87ec6cf47
- FEDORA-2023-b87ec6cf47
- https://matt.ucc.asn.au/dropbear/CHANGES
- https://matt.ucc.asn.au/dropbear/CHANGES
- https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
- https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
- https://news.ycombinator.com/item?id=38684904
- https://news.ycombinator.com/item?id=38684904
- https://news.ycombinator.com/item?id=38685286
- https://news.ycombinator.com/item?id=38685286
- https://news.ycombinator.com/item?id=38732005
- https://news.ycombinator.com/item?id=38732005
- https://nova.app/releases/#v11.8
- https://nova.app/releases/#v11.8
- https://oryx-embedded.com/download/#changelog
- https://oryx-embedded.com/download/#changelog
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
- https://roumenpetrov.info/secsh/#news20231220
- https://roumenpetrov.info/secsh/#news20231220
- GLSA-202312-16
- GLSA-202312-16
- GLSA-202312-17
- GLSA-202312-17
- https://security.netapp.com/advisory/ntap-20240105-0004/
- https://security.netapp.com/advisory/ntap-20240105-0004/
- https://security-tracker.debian.org/tracker/CVE-2023-48795
- https://security-tracker.debian.org/tracker/CVE-2023-48795
- https://security-tracker.debian.org/tracker/source-package/libssh2
- https://security-tracker.debian.org/tracker/source-package/libssh2
- https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
- https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
- https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
- https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
- https://support.apple.com/kb/HT214084
- https://support.apple.com/kb/HT214084
- https://thorntech.com/cve-2023-48795-and-sftp-gateway/
- https://thorntech.com/cve-2023-48795-and-sftp-gateway/
- https://twitter.com/TrueSkrillor/status/1736774389725565005
- https://twitter.com/TrueSkrillor/status/1736774389725565005
- https://ubuntu.com/security/CVE-2023-48795
- https://ubuntu.com/security/CVE-2023-48795
- https://winscp.net/eng/docs/history#6.2.2
- https://winscp.net/eng/docs/history#6.2.2
- https://www.bitvise.com/ssh-client-version-history#933
- https://www.bitvise.com/ssh-client-version-history#933
- https://www.bitvise.com/ssh-server-version-history
- https://www.bitvise.com/ssh-server-version-history
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
- https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
- DSA-5586
- DSA-5586
- DSA-5588
- DSA-5588
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
- https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
- https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
- https://www.netsarang.com/en/xshell-update-history/
- https://www.netsarang.com/en/xshell-update-history/
- https://www.openssh.com/openbsd.html
- https://www.openssh.com/openbsd.html
- https://www.openssh.com/txt/release-9.6
- https://www.openssh.com/txt/release-9.6
- https://www.openwall.com/lists/oss-security/2023/12/18/2
- https://www.openwall.com/lists/oss-security/2023/12/18/2
- https://www.openwall.com/lists/oss-security/2023/12/20/3
- https://www.openwall.com/lists/oss-security/2023/12/20/3
- https://www.paramiko.org/changelog.html
- https://www.paramiko.org/changelog.html
- https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
- https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
- https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
- https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
- https://www.terrapin-attack.com
- https://www.terrapin-attack.com
- https://www.theregister.com/2023/12/20/terrapin_attack_ssh
- https://www.theregister.com/2023/12/20/terrapin_attack_ssh
- https://www.vandyke.com/products/securecrt/history.txt
- https://www.vandyke.com/products/securecrt/history.txt
Modified: 2024-11-21
CVE-2023-51384
In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
- 20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4
- 20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4
- https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b
- https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b
- https://security.netapp.com/advisory/ntap-20240105-0005/
- https://security.netapp.com/advisory/ntap-20240105-0005/
- https://support.apple.com/kb/HT214084
- https://support.apple.com/kb/HT214084
- DSA-5586
- DSA-5586
- https://www.openssh.com/txt/release-9.6
- https://www.openssh.com/txt/release-9.6
- https://www.openwall.com/lists/oss-security/2023/12/18/2
- https://www.openwall.com/lists/oss-security/2023/12/18/2
Modified: 2024-11-21
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://www.openwall.com/lists/oss-security/2024/07/01/12
- http://www.openwall.com/lists/oss-security/2024/07/01/13
- http://www.openwall.com/lists/oss-security/2024/07/02/1
- http://www.openwall.com/lists/oss-security/2024/07/03/1
- http://www.openwall.com/lists/oss-security/2024/07/03/11
- http://www.openwall.com/lists/oss-security/2024/07/03/2
- http://www.openwall.com/lists/oss-security/2024/07/03/3
- http://www.openwall.com/lists/oss-security/2024/07/03/4
- http://www.openwall.com/lists/oss-security/2024/07/03/5
- http://www.openwall.com/lists/oss-security/2024/07/04/1
- http://www.openwall.com/lists/oss-security/2024/07/04/2
- http://www.openwall.com/lists/oss-security/2024/07/08/2
- http://www.openwall.com/lists/oss-security/2024/07/08/3
- http://www.openwall.com/lists/oss-security/2024/07/09/2
- http://www.openwall.com/lists/oss-security/2024/07/09/5
- http://www.openwall.com/lists/oss-security/2024/07/10/1
- http://www.openwall.com/lists/oss-security/2024/07/10/2
- http://www.openwall.com/lists/oss-security/2024/07/10/3
- http://www.openwall.com/lists/oss-security/2024/07/10/4
- http://www.openwall.com/lists/oss-security/2024/07/10/6
- http://www.openwall.com/lists/oss-security/2024/07/11/1
- http://www.openwall.com/lists/oss-security/2024/07/11/3
- http://www.openwall.com/lists/oss-security/2024/07/23/4
- http://www.openwall.com/lists/oss-security/2024/07/23/6
- http://www.openwall.com/lists/oss-security/2024/07/28/2
- http://www.openwall.com/lists/oss-security/2024/07/28/3
- RHSA-2024:4312
- RHSA-2024:4312
- RHSA-2024:4340
- RHSA-2024:4340
- RHSA-2024:4389
- RHSA-2024:4389
- RHSA-2024:4469
- RHSA-2024:4469
- RHSA-2024:4474
- RHSA-2024:4474
- RHSA-2024:4479
- RHSA-2024:4479
- RHSA-2024:4484
- RHSA-2024:4484
- https://access.redhat.com/security/cve/CVE-2024-6387
- https://access.redhat.com/security/cve/CVE-2024-6387
- https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/
- https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/
- https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
- RHBZ#2294604
- RHBZ#2294604
- https://explore.alas.aws.amazon.com/CVE-2024-6387.html
- https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
- https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
- https://github.com/AlmaLinux/updates/issues/629
- https://github.com/Azure/AKS/issues/4379
- https://github.com/microsoft/azurelinux/issues/9555
- https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09
- https://github.com/oracle/oracle-linux/issues/149
- https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
- https://github.com/PowerShell/Win32-OpenSSH/issues/2249
- https://github.com/rapier1/hpn-ssh/issues/87
- https://github.com/zgzhang/cve-2024-6387-poc
- https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/
- https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
- https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
- https://news.ycombinator.com/item?id=40843778
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
- https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
- https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
- https://security.netapp.com/advisory/ntap-20240701-0001/
- https://security-tracker.debian.org/tracker/CVE-2024-6387
- https://sig-security.rocky.page/issues/CVE-2024-6387/
- https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://ubuntu.com/security/CVE-2024-6387
- https://ubuntu.com/security/notices/USN-6859-1
- https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do
- https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100
- https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
- https://www.openssh.com/txt/release-9.8
- https://www.openssh.com/txt/release-9.8
- https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
- https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
- https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
- https://www.suse.com/security/cve/CVE-2024-6387.html
- https://www.theregister.com/2024/07/01/regresshion_openssh/
- https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387
Closed bugs
Неверный код возврата при запуске ssh-agent