Логотип exploitDog
bind:CVE-2024-6387
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6387

Количество 13

Количество 13

ubuntu логотип

CVE-2024-6387

12 месяцев назад

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS3: 8.1
EPSS: Средний
redhat логотип

CVE-2024-6387

12 месяцев назад

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS3: 8.1
EPSS: Средний
nvd логотип

CVE-2024-6387

12 месяцев назад

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS3: 8.1
EPSS: Средний
msrc логотип

CVE-2024-6387

11 месяцев назад

RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling

CVSS3: 8.1
EPSS: Средний
debian логотип

CVE-2024-6387

12 месяцев назад

A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ...

CVSS3: 8.1
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:2275-2

12 месяцев назад

Security update for openssh

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:2275-1

12 месяцев назад

Security update for openssh

EPSS: Средний
github логотип

GHSA-2x8c-95vh-gfv4

12 месяцев назад

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

CVSS3: 8.1
EPSS: Средний
oracle-oval логотип

ELSA-2024-4312

12 месяцев назад

ELSA-2024-4312: openssh security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12468

12 месяцев назад

ELSA-2024-12468: openssh security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-04914

12 месяцев назад

Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 9
EPSS: Средний
redos логотип

ROS-20240704-01

12 месяцев назад

Уязвимость openssh

CVSS2: 7.6
EPSS: Средний
fstec логотип

BDU:2024-06777

11 месяцев назад

Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS3: 8.1
52%
Средний
12 месяцев назад
redhat логотип
CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS3: 8.1
52%
Средний
12 месяцев назад
nvd логотип
CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVSS3: 8.1
52%
Средний
12 месяцев назад
msrc логотип
CVE-2024-6387

RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling

CVSS3: 8.1
52%
Средний
11 месяцев назад
debian логотип
CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ...

CVSS3: 8.1
52%
Средний
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2275-2

Security update for openssh

52%
Средний
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2275-1

Security update for openssh

52%
Средний
12 месяцев назад
github логотип
GHSA-2x8c-95vh-gfv4

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

CVSS3: 8.1
52%
Средний
12 месяцев назад
oracle-oval логотип
ELSA-2024-4312

ELSA-2024-4312: openssh security update (IMPORTANT)

12 месяцев назад
oracle-oval логотип
ELSA-2024-12468

ELSA-2024-12468: openssh security update (IMPORTANT)

12 месяцев назад
fstec логотип
BDU:2024-04914

Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 9
52%
Средний
12 месяцев назад
redos логотип
ROS-20240704-01

Уязвимость openssh

CVSS2: 7.6
52%
Средний
12 месяцев назад
fstec логотип
BDU:2024-06777

Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root

CVSS3: 8.1
2%
Низкий
11 месяцев назад

Уязвимостей на страницу