Show filters
19 Total Results
Displaying 11-19 of 19
Sort by:
Attacker Value
Unknown
CVE-2008-4109
Disclosure Date: September 18, 2008 (last updated October 04, 2023)
A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
0
Attacker Value
Unknown
CVE-2008-3259
Disclosure Date: July 22, 2008 (last updated October 04, 2023)
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
0
Attacker Value
Unknown
CVE-2008-3234
Disclosure Date: July 18, 2008 (last updated October 04, 2023)
sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.
0
Attacker Value
Unknown
CVE-2007-2243
Disclosure Date: April 25, 2007 (last updated October 04, 2023)
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
0
Attacker Value
Unknown
CVE-2006-5052
Disclosure Date: September 27, 2006 (last updated October 04, 2023)
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
0
Attacker Value
Unknown
CVE-2006-4924
Disclosure Date: September 27, 2006 (last updated October 04, 2023)
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
0
Attacker Value
Unknown
CVE-2006-0225
Disclosure Date: January 25, 2006 (last updated October 04, 2023)
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
0
Attacker Value
Unknown
CVE-2005-2798
Disclosure Date: September 06, 2005 (last updated October 04, 2023)
sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
0
Attacker Value
Unknown
CVE-2005-2797
Disclosure Date: September 06, 2005 (last updated October 04, 2023)
OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
0