Логотип exploitDog
bind:CVE-2023-25136
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25136

Количество 7

Количество 7

ubuntu логотип

CVE-2023-25136

больше 2 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
redhat логотип

CVE-2023-25136

больше 2 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
nvd логотип

CVE-2023-25136

больше 2 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
EPSS: Критический
debian логотип

CVE-2023-25136

больше 2 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...

CVSS3: 6.5
EPSS: Критический
github логотип

GHSA-w62j-g234-3f6f

больше 2 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."

CVSS3: 9.8
EPSS: Критический
oracle-oval логотип

ELSA-2023-2645

больше 2 лет назад

ELSA-2023-2645: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-00711

больше 2 лет назад

Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
больше 2 лет назад
redhat логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
больше 2 лет назад
nvd логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
90%
Критический
больше 2 лет назад
debian логотип
CVE-2023-25136

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...

CVSS3: 6.5
90%
Критический
больше 2 лет назад
github логотип
GHSA-w62j-g234-3f6f

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."

CVSS3: 9.8
90%
Критический
больше 2 лет назад
oracle-oval логотип
ELSA-2023-2645

ELSA-2023-2645: openssh security update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2023-00711

Уязвимость компонента options.kex_algorithms сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
90%
Критический
больше 2 лет назад

Уязвимостей на страницу