Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown

CVE-2010-4478

Disclosure Date: December 06, 2010 (last updated October 04, 2023)
OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
0
Attacker Value
Unknown

CVE-2008-4109

Disclosure Date: September 18, 2008 (last updated October 04, 2023)
A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
0
Attacker Value
Unknown

CVE-2008-3259

Disclosure Date: July 22, 2008 (last updated October 04, 2023)
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
0
Attacker Value
Unknown

CVE-2007-2243

Disclosure Date: April 25, 2007 (last updated October 04, 2023)
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
0
Attacker Value
Unknown

CVE-2006-5052

Disclosure Date: September 27, 2006 (last updated October 04, 2023)
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
0
Attacker Value
Unknown

CVE-2006-4924

Disclosure Date: September 27, 2006 (last updated October 04, 2023)
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
0
Attacker Value
Unknown

CVE-2003-1562

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
0
Attacker Value
Unknown

CVE-2002-0640

Disclosure Date: July 03, 2002 (last updated February 22, 2025)
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
0
Attacker Value
Unknown

CVE-2002-0575

Disclosure Date: June 18, 2002 (last updated February 22, 2025)
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
0
Attacker Value
Unknown

CVE-2001-1585

Disclosure Date: December 31, 2001 (last updated February 22, 2025)
SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.
0