Page 9 of 333 results (0.007 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

07 Mar 2017 — The sys_thrsigdivert function in kern/kern_sig.c in the OpenBSD kernel 5.9 allows remote attackers to cause a denial of service (panic) via a negative "ts.tv_sec" value. La función sys_thrsigdivert en kern/kern_sig.c en el kernel OpenBSD 5.9 permite a atacantes remotos provocar una denegación de servicio (pánico) a través de un valor "ts.tv_sec" negativo. • http://www.openwall.com/lists/oss-security/2016/07/17/7 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 49%CPEs: 1EXPL: 4

06 Feb 2017 — httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header. httpd en OpenBSD permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de una serie de peticiones para un archivo grande utilizando un encabezado HTTP Range. OpenBSD HTTP server versions up to 6.0 suffer from a denial of service vulnerability. • https://packetstorm.news/files/id/140944 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

25 Dec 2016 — authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. authfile.c en sshd en OpenSSH en versiones anteriores a 7.4 no considera apropiadamente los efectos de realloc en el contenido de búfer, lo que podría permitir a usuarios locales obtener información sensible de clave privada aprovechando el acceso a un subproceso se... • http://www.openwall.com/lists/oss-security/2016/12/19/2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-320: Key Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

25 Dec 2016 — The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures. El administrador de memoria compartida (asociado con la compresión de pre-autenticación) en sshd en OpenSSH en versiones anteriores a 7.4 no asegura que una verificación de l... • http://www.openwall.com/lists/oss-security/2016/12/19/2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 3

23 Dec 2016 — Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket. Vulnerabilidad de ruta de búsqueda no confiable en ssh-agent.c en ssh-agent en OpenSSH en versiones anteriores a 7.4 permite a atacantes remotos ejecutar modulos locales PKCS#11 arbitrarios aprovechando el control sobre un agent-socket reenviado. It was found that ssh-agent could load PKCS#11 modules from... • https://packetstorm.news/files/id/173661 • CWE-426: Untrusted Search Path •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 2

23 Dec 2016 — sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c. sshd en OpenSSH en versiones anteriores a 7.4, cuando no se utiliza la separación de privilegios, crea Unix-domain sockets reenviados como root, lo que podría permitir a usuarios locales obtener privilegios a través de vectores no especificados, relacionado con serverloop.c. The ssh-agent(1) agent ... • https://packetstorm.news/files/id/140262 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 59%CPEs: 6EXPL: 1

07 Dec 2016 — The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue." ** DISPUTADA ** La función kex_input_kexinit en kex.c en OpenSSH 6.x y 7.x hasta la versión 7.3 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) enviando muchas peticiones duplicadas KEXI... • https://github.com/dag-erling/kexkill • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 76%CPEs: 2EXPL: 5

07 Aug 2016 — The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string. La función auth_password en auth-passwd.c en sshd en OpenSSH en versiones anteriores a 7.3 no limita longitudes de contraseña para autenticación de contraseña, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de CPU clave) a través de una caden... • https://packetstorm.news/files/id/140070 • CWE-20: Improper Input Validation CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.9EPSS: 92%CPEs: 1EXPL: 9

18 Jul 2016 — sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. sshd en OpenSSH en versiones anteriores a 7.3, cuando SHA256 o SHA512 son utilizados para el hashing de la contraseña del usuario, utiliza BLOWFISH hashing en una contraseña estática cuando no existe el nombre d... • https://packetstorm.news/files/id/181223 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-385: Covert Timing Channel •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

15 Apr 2016 — The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable. La función do_setup_env en session.c en sshd en OpenSSH hasta la versión 7.2p2, cuando la funcionalidad UseLogin está activa y PAM está configurado para leer archivos... • http://rhn.redhat.com/errata/RHSA-2016-2588.html • CWE-264: Permissions, Privileges, and Access Controls CWE-863: Incorrect Authorization •