Page 7 of 71 results (0.011 seconds)

CVSS: 6.4EPSS: 4%CPEs: 1EXPL: 0

The auth_via_key function in pam_ssh.c in pam_ssh before 1.92, when the allow_blank_passphrase option is disabled, allows remote attackers to bypass authentication restrictions and use private encryption keys requiring a blank passphrase by entering a non-blank passphrase. La función auth_via_key en pam_ssh.c de pam_ssh before 1.92, cuando la opción allow_blank_passphrase está deshabilitada, permite a atacantes remotos evitar restricciones de autenticación y utilizar claves de cifrado privadas requiriendo una cadena de contraseña en blanco, introduciendo una cadena de contraseña no en blanco. • http://osvdb.org/33119 http://secunia.com/advisories/24061 http://sourceforge.net/project/shownotes.php?release_id=484376 http://www.securityfocus.com/bid/22461 http://www.vupen.com/english/advisories/2007/0524 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents Tectia from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339. SSH Tectia Client/Server/Connector 5.1.0 y anteriores, Manager 2.2.0 y anteriores, y otros productos, al usar una clave RSA con exponente 3, borra el relleno PKCS-1 antes de generar un hash, lo cual permite a atacantes remotos forjar una firma PKCS #1 v1.5 que es firmada por esa clave RSA y evita que Tectia verifique correctamente certificados X.509 y otros certificados que usan PKCS #1, un asunto similar a CVE-2006-4339. • http://secunia.com/advisories/22350 http://securitytracker.com/id?1017060 http://securitytracker.com/id?1017061 http://www.kb.cert.org/vuls/id/845620 http://www.ssh.com/company/news/2006/english/security/article/786 http://www.vupen.com/english/advisories/2006/4032 •

CVSS: 7.2EPSS: 0%CPEs: 50EXPL: 0

Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories. Vulnerabilidad de ruta no confiable en la búsqueda no literal de Windows en múltiples productos SSH de Tectia, incluyendo el Client/Server/Connector 5.0.0 y 5.0.1 y Client/Server anterior a 4.4.5, y Manager 2.12 y anteriores, cuando se ejecutan en Windows, podrían permitir a usuarios locales escalar privilegios mediante un archivo de programa malicioso en "Archivos de Programa" o sus subdirectorios. • http://securitytracker.com/id?1016743 http://www.securityfocus.com/bid/19679 http://www.ssh.com/company/news/2006/english/security/article/775 https://exchange.xforce.ibmcloud.com/vulnerabilities/28566 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the "Restart" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user's program and restart it with root privileges. El agente de administración de SSH Tectia (SSH Tectia Management Agent 2.1.2) permite a usuarios locales obtener privilegios de root ejecutando un programa con nombre sshd, lo que se consigue mediante un listado de procesos cuando la acción "Reiniciar" (Restart) se selecciona desde la interfaz gráfica de usuario (GUI) del servidor de administración, lo cual provoca que el agente localice el nombre de ruta del programa del usuario y lo reinicie con privilegios de root. • http://secunia.com/advisories/21559 http://securitytracker.com/id?1016744 http://www.osvdb.org/28159 http://www.securityfocus.com/bid/19677 http://www.ssh.com/company/news/2006/english/security/article/776 https://exchange.xforce.ibmcloud.com/vulnerabilities/28561 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30. • https://www.exploit-db.com/exploits/1572 http://securitytracker.com/id?1015742 http://www.securityfocus.com/archive/1/426999/100/0/threaded http://www.securityfocus.com/bid/17024 https://exchange.xforce.ibmcloud.com/vulnerabilities/25075 •