CVE-2011-0539
https://notcve.org/view.php?id=CVE-2011-0539
The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks. La función key_certify en usr.bin/ssh/key.c en OpenSSH v5.6 y v5.7 al generar los certificados de herencia con la opción de línea de comandos -t en ssh-keygen, no se inicializa el campo nonce, que podría permitir a atacantes remotos obtener contenido sensible de la pila de memoria o que sea más fácil de llevar a cabo ataques de colisión hash. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 http://secunia.com/advisories/43181 http://secunia.com/advisories/44269 http://www.openssh.com/txt/legacy-cert.adv http://www.openwall.com/lists/oss-security/2011/02/04/2 http://www.securityfocus.com/bid/46155 http://www.securitytracker.com/id?1025028 http://www.vupen.com/english/advisories/2011/0284 https://exchange.xforce.ibmcloud. • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2010-4478
https://notcve.org/view.php?id=CVE-2010-4478
OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252. OpenSSH v5.6 y versiones anteriores, si J-PAKE está activo, no valida apropiadamente los parámetros públicos en el protocolo J-PAKE, lo que permite a atacantes remotos evitar la necesidad de conocer el secreto compartido, y autenticarse con éxito, enviando valores modificados en cada turno del protocolo. Relacionado con CVE-2010-4252. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5 http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h https://bugzilla.redhat.com/show_bug.cgi?id=659297 https://github.com/seb-m/jpake https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12338 • CWE-287: Improper Authentication •
CVE-2009-3572
https://notcve.org/view.php?id=CVE-2009-3572
OpenBSD 4.4, 4.5, and 4.6, when running on an i386 kernel, does not properly handle XMM exceptions, which allows local users to cause a denial of service (kernel panic) via unspecified vectors. OpenBSD v4.4, v4.5, y v4.6, cuando se ejecuta sobre un kernel i386 no maneja adecuadamente la excepciones XMM, lo que permite a usuarios locales producir una denegación de servicio (kernel panic) a través de vectores inespecíficos. • http://marc.info/?l=openbsd-security-announce&m=125474331811594 http://secunia.com/advisories/36956 http://www.openbsd.org/errata44.html http://www.openbsd.org/errata45.html http://www.openbsd.org/errata46.html http://www.securityfocus.com/bid/36589 •
CVE-2009-2904 – openssh: possible privilege escalation when using ChrootDirectory setting
https://notcve.org/view.php?id=CVE-2009-2904
A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership. Ciertas modificaciones Ret Hat en ChrootDirectory feature en OpenSSH v4.8, como el usado en sshd en OpenSSH v4.3 en Red Hat Enterprise Linux (RHEL) v5.4 y Fedora v11, permite a usuarios locales obtener privilegios a través de enlaces fuertes en programas setuid que usa una configuración de ficheros con el chroot directory, relacionado con requerimientos para el propietario. • http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038214.html http://lists.vmware.com/pipermail/security-announce/2010/000082.html http://osvdb.org/58495 http://secunia.com/advisories/38794 http://secunia.com/advisories/38834 http://secunia.com/advisories/39182 http://www.securityfocus.com/bid/36552 http://www.vupen.com/english/advisories/2010/0528 https://bugzilla.redhat.com/show_bug.cgi?id=522141 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg • CWE-16: Configuration •
CVE-2009-0687 – Multiple Vendor - PF Null Pointer Dereference
https://notcve.org/view.php?id=CVE-2009-0687
The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload. La función pf_test_rule de OpenBSD Packet Filter (PF), tal como es usada en OpenBSD v4.2 hasta v4.5, NetBSD v5.0 anterior a RC3, MirOS v10 y anteriores y MidnightBSD v0.3 hasta la versión actual permite a atacantes remotos causar una denegación de servicio a través de paquetes IP modificados que provocan una "desreferencia" de un puntero nulo relacionada con un paquete IPv4 con datos ("payload") ICMPv6. • https://www.exploit-db.com/exploits/8581 https://www.exploit-db.com/exploits/8430 https://www.exploit-db.com/exploits/8406 ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-001.txt.asc http://www.helith.net/txt/multiple_vendor-PF_null_pointer_dereference.txt http://www.openbsd.org/errata43.html#013_pf http://www.openbsd.org/errata44.html#013_pf http://www.openbsd.org/errata45.html • CWE-399: Resource Management Errors •