Vulnerabilities > Openbsd > Openssh > 4.3p2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-03-18 | CVE-2014-2532 | Permissions, Privileges, and Access Controls vulnerability in multiple products sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. | 5.8 |
2014-02-03 | CVE-2011-4327 | Information Exposure vulnerability in Openbsd Openssh ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call. | 2.1 |
2013-03-07 | CVE-2010-5107 | Denial of Service vulnerability in OpenSSH The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections. | 5.0 |
2012-04-05 | CVE-2011-5000 | Numeric Errors vulnerability in Openbsd Openssh The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. | 3.5 |
2011-03-02 | CVE-2010-4755 | Resource Management Errors vulnerability in multiple products The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632. | 4.0 |
2008-09-18 | CVE-2008-4109 | Permissions, Privileges, and Access Controls vulnerability in Openbsd Openssh A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. | 5.0 |
2008-07-22 | CVE-2008-3259 | Information Exposure vulnerability in Openbsd Openssh OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform. | 1.2 |
2008-03-24 | CVE-2008-1483 | Permissions, Privileges, and Access Controls vulnerability in Openbsd Openssh 4.3P2 OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs. | 6.9 |
2007-10-18 | CVE-2007-3102 | Remote Log Injection vulnerability in Openbsd Openssh 4.3P2 Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. | 4.3 |
2007-09-12 | CVE-2007-4752 | Improper Input Validation vulnerability in Openbsd Openssh ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted. | 7.5 |