Логотип exploitDog
bind:"CVE-2023-25136"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-25136"

Количество 8

Количество 8

ubuntu логотип

CVE-2023-25136

около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
redhat логотип

CVE-2023-25136

около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
nvd логотип

CVE-2023-25136

около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
msrc логотип

CVE-2023-25136

4 месяца назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
debian логотип

CVE-2023-25136

около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...

CVSS3: 6.5
EPSS: Критический
github логотип

GHSA-w62j-g234-3f6f

около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."

CVSS3: 9.8
EPSS: Критический
oracle-oval логотип

ELSA-2023-2645

больше 2 лет назад

ELSA-2023-2645: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-00711

около 3 лет назад

Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
около 3 лет назад
redhat логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
около 3 лет назад
nvd логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
около 3 лет назад
msrc логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
4 месяца назад
debian логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...

CVSS3: 6.5
90%
Критический
около 3 лет назад
github логотип
GHSA-w62j-g234-3f6f

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."

CVSS3: 9.8
90%
Критический
около 3 лет назад
oracle-oval логотип
ELSA-2023-2645

ELSA-2023-2645: openssh security update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2023-00711

Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
90%
Критический
около 3 лет назад

Уязвимостей на страницу