Show filters
240 Total Results
Displaying 11-20 of 240
Sort by:
Attacker Value
Unknown

CVE-2007-4752

Disclosure Date: September 12, 2007 (last updated October 04, 2023)
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
1
Attacker Value
Unknown

CVE-2024-45337

Disclosure Date: December 12, 2024 (last updated February 18, 2025)
Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be …
0
Attacker Value
Unknown

CVE-2024-49049

Disclosure Date: November 12, 2024 (last updated November 19, 2024)
Visual Studio Code Remote Extension Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2024-43410

Disclosure Date: August 21, 2024 (last updated August 22, 2024)
Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length. After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1.
0
Attacker Value
Unknown

CVE-2024-6580

Disclosure Date: July 08, 2024 (last updated July 09, 2024)
The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application). IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates.
0
Attacker Value
Unknown

CVE-2024-2873

Disclosure Date: March 25, 2024 (last updated January 05, 2025)
A vulnerability was found in wolfSSH's server-side state machine before versions 1.4.17. A malicious client could create channels without first performing user authentication, resulting in unauthorized access.
0
Attacker Value
Unknown

CVE-2023-6004

Disclosure Date: January 03, 2024 (last updated May 22, 2024)
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Attacker Value
Unknown

CVE-2023-51767

Disclosure Date: December 24, 2023 (last updated February 28, 2024)
OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
Attacker Value
Unknown

CVE-2023-6918

Disclosure Date: December 19, 2023 (last updated May 22, 2024)
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
Attacker Value
Unknown

CVE-2023-51385

Disclosure Date: December 18, 2023 (last updated January 04, 2024)
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.