3 results (0.027 seconds)

CVSS: 7.5EPSS: 13%CPEs: 5EXPL: 1

23 Dec 2013 — denyhosts 2.6 uses an incorrect regular expression when analyzing authentication logs, which allows remote attackers to cause a denial of service (incorrect block of IP addresses) via crafted login names. denyhosts v2.6 utiliza una expresión regular incorrecta al analizar los registros de autenticación, , lo cual permite a atacantes remotos causar una denegación de servicio (secuencia incorrecta de direcciones IP) a través de nombres de inicio de sesión manipulados. Helmut Grohne discovered that denyhosts, ... • https://www.exploit-db.com/exploits/38909 • CWE-287: Improper Authentication •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

30 Oct 2007 — DenyHosts 2.6 processes OpenSSH sshd "not listed in AllowUsers" log messages with an incorrect regular expression that does not match an IP address, which might allow remote attackers to avoid detection and blocking when making invalid login attempts with a username not present in AllowUsers, as demonstrated by the root username, a different vulnerability than CVE-2007-4323. DenyHosts 2.6 procesa mensajes de registro (log) de OpenSSH sshd del tipo "no listado en usuarios permitidos" (not listed in AllowUser... • http://bugs.gentoo.org/show_bug.cgi?id=181213 • CWE-16: Configuration •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

14 Aug 2007 — DenyHosts 2.6 does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6301. DenyHosts 2.6 no analiza adecuadamente archivos de registro de sshd, lo cual permite a atacantes remotos añadir anfitriones de su elecci... • http://bugs.gentoo.org/show_bug.cgi?id=181213 •