Количество 36
Количество 36

SUSE-SU-2016:2388-1
Security update for openssh
GHSA-2f6c-wrfr-f7rw
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

BDU:2023-07108
Уязвимость средства криптографической защиты OpenSSH, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код или остановить службу sshd

CVE-2015-6564
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

CVE-2015-6564
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

CVE-2015-6564
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6564
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in ...

CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2015-5352
The x11_open_helper function in channels.c in ssh in OpenSSH before 6. ...
GHSA-cm6p-9f8w-c878
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
GHSA-6fpx-j7j8-53rc
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

BDU:2023-07109
Уязвимость функции mm_answer_pam_free_ctx средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код или остановить службу sshd

BDU:2021-03142
Уязвимость средства криптографической защиты OpenSSH, связанная с ошибками управления привилегиями, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

SUSE-SU-2015:1840-1
Security update for openssh
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2016:2388-1 Security update for openssh | почти 9 лет назад | ||
GHSA-2f6c-wrfr-f7rw The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. | 0% Низкий | больше 3 лет назад | ||
![]() | BDU:2023-07108 Уязвимость средства криптографической защиты OpenSSH, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код или остановить службу sshd | CVSS3: 7.4 | 0% Низкий | около 10 лет назад |
![]() | CVE-2015-6564 Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. | CVSS2: 6.9 | 5% Низкий | около 10 лет назад |
![]() | CVE-2015-6564 Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. | CVSS2: 4 | 5% Низкий | около 10 лет назад |
![]() | CVE-2015-6564 Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. | CVSS2: 6.9 | 5% Низкий | около 10 лет назад |
CVE-2015-6564 Use-after-free vulnerability in the mm_answer_pam_free_ctx function in ... | CVSS2: 6.9 | 5% Низкий | около 10 лет назад | |
![]() | CVE-2015-5352 The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. | CVSS2: 4.3 | 5% Низкий | около 10 лет назад |
![]() | CVE-2015-5352 The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. | CVSS2: 4.9 | 5% Низкий | около 10 лет назад |
![]() | CVE-2015-5352 The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. | CVSS2: 4.3 | 5% Низкий | около 10 лет назад |
CVE-2015-5352 The x11_open_helper function in channels.c in ssh in OpenSSH before 6. ... | CVSS2: 4.3 | 5% Низкий | около 10 лет назад | |
GHSA-cm6p-9f8w-c878 Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. | 5% Низкий | больше 3 лет назад | ||
GHSA-6fpx-j7j8-53rc The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. | 5% Низкий | больше 3 лет назад | ||
![]() | BDU:2023-07109 Уязвимость функции mm_answer_pam_free_ctx средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код или остановить службу sshd | CVSS3: 7.4 | 5% Низкий | около 10 лет назад |
![]() | BDU:2021-03142 Уязвимость средства криптографической защиты OpenSSH, связанная с ошибками управления привилегиями, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 3.1 | 5% Низкий | около 10 лет назад |
![]() | SUSE-SU-2015:1840-1 Security update for openssh | почти 10 лет назад |
Уязвимостей на страницу