Show filters
321 Total Results
Displaying 101-110 of 321
Sort by:
Attacker Value
Unknown
CVE-2014-7250
Disclosure Date: December 12, 2014 (last updated October 05, 2023)
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.
0
Attacker Value
Unknown
CVE-2014-9278
Disclosure Date: December 06, 2014 (last updated October 05, 2023)
The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.
0
Attacker Value
Unknown
CVE-2013-2125
Disclosure Date: May 27, 2014 (last updated October 05, 2023)
OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which allows remote attackers to cause a denial of service (connection blocking) by keeping a connection open.
0
Attacker Value
Unknown
CVE-2014-2653
Disclosure Date: March 27, 2014 (last updated October 05, 2023)
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
0
Attacker Value
Unknown
CVE-2014-2532
Disclosure Date: March 18, 2014 (last updated November 25, 2024)
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
0
Attacker Value
Unknown
CVE-2011-4327
Disclosure Date: February 03, 2014 (last updated October 05, 2023)
ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
0
Attacker Value
Unknown
CVE-2014-1692
Disclosure Date: January 29, 2014 (last updated October 05, 2023)
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
0
Attacker Value
Unknown
CVE-2013-4548
Disclosure Date: November 08, 2013 (last updated October 05, 2023)
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
0
Attacker Value
Unknown
CVE-2010-5107
Disclosure Date: March 07, 2013 (last updated October 05, 2023)
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
0
Attacker Value
Unknown
CVE-2011-5000
Disclosure Date: April 05, 2012 (last updated October 04, 2023)
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
0