Show filters
240 Total Results
Displaying 91-100 of 240
Sort by:
Attacker Value
Unknown
CVE-2017-9079
Disclosure Date: May 19, 2017 (last updated November 26, 2024)
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
0
Attacker Value
Unknown
CVE-2016-1908
Disclosure Date: April 11, 2017 (last updated November 26, 2024)
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
0
Attacker Value
Unknown
CVE-2016-7406
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
Format string vulnerability in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
0
Attacker Value
Unknown
CVE-2016-7409
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
0
Attacker Value
Unknown
CVE-2016-7408
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
0
Attacker Value
Unknown
CVE-2016-7407
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
0
Attacker Value
Unknown
CVE-2016-6210
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
0
Attacker Value
Unknown
CVE-2016-10011
Disclosure Date: January 05, 2017 (last updated November 25, 2024)
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
0
Attacker Value
Unknown
CVE-2016-10012
Disclosure Date: January 05, 2017 (last updated November 08, 2023)
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
0
Attacker Value
Unknown
CVE-2016-10010
Disclosure Date: January 05, 2017 (last updated November 25, 2024)
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
0