Show filters
14 Total Results
Displaying 11-14 of 14
Sort by:
Attacker Value
Unknown

CVE-2006-4925

Disclosure Date: September 29, 2006 (last updated October 04, 2023)
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
0
Attacker Value
Unknown

CVE-2001-1029

Disclosure Date: September 20, 2001 (last updated February 22, 2025)
libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.
0
Attacker Value
Unknown

CVE-2001-0572

Disclosure Date: August 22, 2001 (last updated February 22, 2025)
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
0
Attacker Value
Unknown

CVE-2000-0999

Disclosure Date: December 11, 2000 (last updated February 22, 2025)
Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow attackers to gain root privileges.
0