Show filters
321 Total Results
Displaying 131-140 of 321
Sort by:
Attacker Value
Unknown
CVE-2008-3844
Disclosure Date: August 27, 2008 (last updated October 04, 2023)
Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
0
Attacker Value
Unknown
CVE-2008-3259
Disclosure Date: July 22, 2008 (last updated October 04, 2023)
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
0
Attacker Value
Unknown
CVE-2008-3234
Disclosure Date: July 18, 2008 (last updated October 04, 2023)
sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.
0
Attacker Value
Unknown
CVE-2008-1657
Disclosure Date: April 02, 2008 (last updated October 04, 2023)
OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
0
Attacker Value
Unknown
CVE-2008-1483
Disclosure Date: March 24, 2008 (last updated October 04, 2023)
OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
0
Attacker Value
Unknown
CVE-2008-1215
Disclosure Date: March 09, 2008 (last updated October 04, 2023)
Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~" characters.
0
Attacker Value
Unknown
CVE-2008-1058
Disclosure Date: February 28, 2008 (last updated October 04, 2023)
The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2008-1057
Disclosure Date: February 28, 2008 (last updated October 04, 2023)
The ip6_check_rh0hdr function in netinet6/ip6_input.c in OpenBSD 4.2 allows attackers to cause a denial of service (panic) via malformed IPv6 routing headers.
0
Attacker Value
Unknown
CVE-2007-6700
Disclosure Date: February 05, 2008 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in cgi-bin/bgplg in the web interface for the BGPD daemon in OpenBSD 4.1 allows remote attackers to inject arbitrary web script or HTML via the cmd parameter.
0
Attacker Value
Unknown
CVE-2008-0384
Disclosure Date: January 22, 2008 (last updated October 04, 2023)
OpenBSD 4.2 allows local users to cause a denial of service (kernel panic) by calling the SIOCGIFRTLABEL IOCTL on an interface that does not have a route label, which triggers a NULL pointer dereference when the return value from the rtlabel_id2name function is not checked.
0