Show filters
106 Total Results
Displaying 41-50 of 106
Sort by:
Attacker Value
Unknown

CVE-2014-8132

Disclosure Date: December 29, 2014 (last updated October 05, 2023)
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
0
Attacker Value
Unknown

CVE-2014-0017

Disclosure Date: March 14, 2014 (last updated October 05, 2023)
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
0
Attacker Value
Unknown

CVE-2013-4421

Disclosure Date: October 25, 2013 (last updated October 05, 2023)
The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
0
Attacker Value
Unknown

CVE-2013-4434

Disclosure Date: October 25, 2013 (last updated October 05, 2023)
Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.
0
Attacker Value
Unknown

CVE-2013-0176

Disclosure Date: February 05, 2013 (last updated October 05, 2023)
The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
0
Attacker Value
Unknown

CVE-2012-5975

Disclosure Date: December 04, 2012 (last updated October 05, 2023)
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
0
Attacker Value
Unknown

CVE-2012-4561

Disclosure Date: November 30, 2012 (last updated October 05, 2023)
The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-4560

Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-4562

Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Multiple integer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified vulnerabilities.
0
Attacker Value
Unknown

CVE-2012-4559

Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
0