Page 15 of 97 results (0.004 seconds)

CVSS: 10.0EPSS: 65%CPEs: 1EXPL: 0

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. Un "error de gestión de búfer" en buffer_append_space de buffer.c de OpenSSH anteriores a 3.7 puede permitir a atacantes remotos ejecutar código arbitrario causando que una cantidad incorrecta de memoria sea liberada, y corrompiendo el montón. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010135.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010146.html http://marc.info/?l=bugtraq&m=106373247528528&w=2 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106374466212309&w=2 http://marc.info/?l=bugtraq&m=106381396120332&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address. OpenSSH 3.6.1 y anteriores, cuando se restringe el acceso de máquinas por direcciones IP numéricas, y con VerifyReverseMapping desactivado, permite a atacantes remotos evitar restricciones de acceso "from=" y "usuario@maquina" conectandose a una máquina de un sistema cuyo nombre DNS inverso contiene la dirección IP numérica. • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://lists.apple.com/mhonarc/security-announce/msg00038.html http://secunia.com/advisories/21129 http://secunia.com/advisories/21262 http://secunia.com/advisories/21724 http://secunia.com/advisories/22196 http://secunia.com/advisories/23680 http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm http://www.kb.cert.org/vuls/id/978316 http://www.redhat.com/support/errata/RHSA-2006-0298.html http& •

CVSS: 5.0EPSS: 4%CPEs: 8EXPL: 4

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. OpenSSH-portable (OpenSSH) 3.6.1p1 y anteriores con soporte PAM activado envía inmediatamente un mensaje de error cuando un usuario no existe, lo que permite a atacantes remotos determinar nombres de usuario válidos mediante un ataque de temporización. • https://www.exploit-db.com/exploits/26 https://www.exploit-db.com/exploits/25 https://www.exploit-db.com/exploits/3303 http://lab.mediaservice.net/advisory/2003-01-openssh.txt http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004815.html http://marc.info/?l=bugtraq&m=105172058404810&w=2 http://marc.info/?l=bugtraq&m=106018677302607&w=2 http://www.redhat.com/support/errata/RHSA-2003-222.html http://www.redhat.com/support/errata/RHSA-2003-224.html • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0235.html http://www.iss.net/security_center/static/9215.php http://www.openbsd.org/errata.html#sshbsdauth http://www.osvdb.org/5113 http://www.securityfocus.com/bid/4803 •

CVSS: 10.0EPSS: 55%CPEs: 26EXPL: 2

Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt). • https://www.exploit-db.com/exploits/21579 https://www.exploit-db.com/exploits/21578 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 http://marc.info/?l=bugtraq&m=102514371522793&w=2 http://marc.info/?l=bugtraq&m=102514631524575&w=2 http://marc.info/?l=bugtraq&m=102521542826833&w=2 http://marc.info/? •