Page 3 of 30 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 1

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000391 http://www.kb.cert.org/vuls/id/596827 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3 http://www.redhat.com/support/errata/RHSA-2001-033.html •

CVSS: 4.0EPSS: 0%CPEs: 4EXPL: 0

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc http://marc.info/?l=bugtraq&m=98158450021686&w=2 http://www.ciac.org/ciac/bulletins/l-047.shtml http://www.debian.org/security/2001/dsa-023 http://www.debian.org/security/2001/dsa-027 http://www.debian.org/security/2001/dsa-086 http://www.novell.com/linux/security/advisories/adv004_ssh.html http://www.osvdb.org/2116 http://www.securityfocus.com/bid/2344 https://exchange.xforce& • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack. • https://www.exploit-db.com/exploits/20615 http://www.securityfocus.com/archive/1/160648 http://www.securityfocus.com/bid/2345 •

CVSS: 3.6EPSS: 0%CPEs: 4EXPL: 4

ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file. • https://www.exploit-db.com/exploits/20560 http://archives.neohapsis.com/archives/bugtraq/2001-01/0262.html http://www.securityfocus.com/bid/2222 http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5963 •

CVSS: 10.0EPSS: 12%CPEs: 13EXPL: 3

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow. • https://www.exploit-db.com/exploits/349 https://www.exploit-db.com/exploits/20617 http://marc.info/?l=bugtraq&m=98168366406903&w=2 http://razor.bindview.com/publish/advisories/adv_ssh1crc.html http://www.cert.org/advisories/CA-2001-35.html http://www.osvdb.org/503 http://www.osvdb.org/795 http://www.securityfocus.com/bid/2347 https://exchange.xforce.ibmcloud.com/vulnerabilities/6083 •