Количество 7
Количество 7
GHSA-w62j-g234-3f6f
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."

CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
CVE-2023-25136
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...
ELSA-2023-2645
ELSA-2023-2645: openssh security update (MODERATE)

BDU:2023-00711
Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-w62j-g234-3f6f OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy." | CVSS3: 9.8 | 90% Критический | больше 2 лет назад | |
![]() | CVE-2023-25136 OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." | CVSS3: 6.5 | 90% Критический | больше 2 лет назад |
![]() | CVE-2023-25136 OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." | CVSS3: 6.5 | 90% Критический | больше 2 лет назад |
![]() | CVE-2023-25136 OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." | CVSS3: 6.5 | 90% Критический | больше 2 лет назад |
CVE-2023-25136 OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ... | CVSS3: 6.5 | 90% Критический | больше 2 лет назад | |
ELSA-2023-2645 ELSA-2023-2645: openssh security update (MODERATE) | больше 2 лет назад | |||
![]() | BDU:2023-00711 Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 90% Критический | больше 2 лет назад |
Уязвимостей на страницу