Page 10 of 59 results (0.013 seconds)

CVSS: 7.6EPSS: 1%CPEs: 45EXPL: 0

sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747 http://www.securityfocus.com/archive/1/320153 http://www.securityfocus.com/archive/1/320302 http://www.securityfocus.com/archive/1/320440 http://www.securityfocus.com/bid/7482 https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695. "Errores de Memoria" en OpenSSH 3.7.1 y anteriores, con impacto desconocido, un grupo de vulnerabilidades distinto de CAN-2003-0693 y CAN-2003-0695. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106381409220492&w=2 http://www.debian.org/security/2003/dsa-382 http://www.debian.org/security/2003/dsa-383 http://www.redhat.com/support/errata/RHSA-2003-280.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A446 https://access.redhat.com/security/cve/CVE-2003-0682 https://bugzilla& •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693. Múltiples "errores de gestión de búferes" en OpenSSH anteriores a 3.7.1 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario usando (1) buffer_init en buffer.c, (2) buffer_free en buffer.c o (3) una función separada en channels.c, un vulnerabilidad distinta de CAN-2003-0693. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106381396120332&w=2 http://marc.info/?l=bugtraq&m=106381409220492&w=2 http://marc.info/? •

CVSS: 10.0EPSS: 65%CPEs: 1EXPL: 0

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. Un "error de gestión de búfer" en buffer_append_space de buffer.c de OpenSSH anteriores a 3.7 puede permitir a atacantes remotos ejecutar código arbitrario causando que una cantidad incorrecta de memoria sea liberada, y corrompiendo el montón. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010135.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010146.html http://marc.info/?l=bugtraq&m=106373247528528&w=2 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106374466212309&w=2 http://marc.info/?l=bugtraq&m=106381396120332&w=2 http://marc.info/? •

CVSS: 5.0EPSS: 4%CPEs: 8EXPL: 4

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. OpenSSH-portable (OpenSSH) 3.6.1p1 y anteriores con soporte PAM activado envía inmediatamente un mensaje de error cuando un usuario no existe, lo que permite a atacantes remotos determinar nombres de usuario válidos mediante un ataque de temporización. • https://www.exploit-db.com/exploits/26 https://www.exploit-db.com/exploits/25 https://www.exploit-db.com/exploits/3303 http://lab.mediaservice.net/advisory/2003-01-openssh.txt http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004815.html http://marc.info/?l=bugtraq&m=105172058404810&w=2 http://marc.info/?l=bugtraq&m=106018677302607&w=2 http://www.redhat.com/support/errata/RHSA-2003-222.html http://www.redhat.com/support/errata/RHSA-2003-224.html • CWE-203: Observable Discrepancy •