Vulnerabilities (CVE)

Vendor filter

Openbsd Subscribe

Product filter

Openssh Subscribe


99 total CVE
CVE Vendors Products Updated CVSS
CVE-2002-0639 1 Openbsd 1 Openssh 2016-10-18 10.0
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
CVE-2002-0575 1 Openbsd 1 Openssh 2016-10-18 7.5
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
CVE-2002-0083 9 Conectiva, Redhat, Suse and 6 more 11 Secure Linux, Mandrake Single Network Firewall, Mandrake Linux Corporate Server and 8 more 2016-10-18 10.0
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
CVE-1999-1010 1 Openbsd 1 Openssh 2016-10-18 2.1
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
CVE-2010-4755 3 Openbsd, Netbsd, Freebsd 4 Openssh, Netbsd, Freebsd and 1 more 2014-08-08 4.0
The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial...
CVE-2011-4327 1 Openbsd 1 Openssh 2014-02-21 2.1
ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2011-5000 1 Openbsd 1 Openssh 2012-07-22 3.5
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain...
CVE-2004-2760 1 Openbsd 1 Openssh 2009-01-29 6.8
sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier...
CVE-2003-0787 1 Openbsd 1 Openssh 2008-09-10 7.5
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
CVE-2003-0786 1 Openbsd 1 Openssh 2008-09-10 10.0
The SSH1 PAM challenge response authentication in OpenSSH 3.7.1 and 3.7.1p1, when Privilege Separation is disabled, does not check the result of the authentication attempt, which can allow remote attackers to gain privileges.
CVE-2002-0765 1 Openbsd 2 Openssh, Openbsd 2008-09-10 7.5
sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.
CVE-2001-1507 1 Openbsd 1 Openssh 2008-09-10 7.5
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
CVE-2000-0217 2 Ssh, Openbsd 3 Openssh, Ssh, Ssh2 2008-09-10 5.1
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
CVE-2000-0143 2 Ssh, Openbsd 2 Openssh, Ssh 2008-09-10 4.6
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
CVE-2007-2768 1 Openbsd 1 Openssh 2008-09-05 4.3
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time...
CVE-2001-1382 1 Openbsd 1 Openssh 2008-09-05 5.0
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
CVE-2001-0572 2 Ssh, Openbsd 2 Openssh, Ssh 2008-09-05 7.5
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which...
CVE-2000-0999 1 Openbsd 1 Openssh 2008-09-05 10.0
Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow attackers to gain root privileges.
CVE-2003-1562 1 Openbsd 1 Openssh 2008-09-05 7.6
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to...