Vulnerabilities > Openbsd > Openssh > High

DATE CVE VULNERABILITY TITLE RISK
2016-12-09 CVE-2016-8858 Resource Management Errors vulnerability in Openbsd Openssh
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.
network
low complexity
openbsd CWE-399
7.5
2016-08-07 CVE-2016-6515 Improper Input Validation vulnerability in multiple products
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
network
low complexity
openbsd fedoraproject CWE-20
7.5
2016-05-01 CVE-2015-8325 Permissions, Privileges, and Access Controls vulnerability in multiple products
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
local
low complexity
debian openbsd canonical CWE-264
7.8
2016-01-14 CVE-2016-0778 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
network
high complexity
oracle openbsd apple hp sophos CWE-119
8.1
2007-09-12 CVE-2007-4752 Improper Input Validation vulnerability in Openbsd Openssh
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
network
low complexity
openbsd CWE-20
7.5
2006-11-08 CVE-2006-5794 Unspecified vulnerability in Openbsd Openssh
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication.
network
low complexity
openbsd
7.5
2006-09-27 CVE-2006-5051 Double Free vulnerability in multiple products
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
network
high complexity
openbsd debian apple CWE-415
8.1
2006-09-27 CVE-2006-4924 Resource Management Errors vulnerability in Openbsd Openssh
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
network
low complexity
openbsd CWE-399
7.8
2003-11-17 CVE-2003-0787 Unspecified vulnerability in Openbsd Openssh 3.7.1/3.7.1P1
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
network
low complexity
openbsd
7.5
2003-10-06 CVE-2003-0695 Unspecified vulnerability in Openbsd Openssh
Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.
network
low complexity
openbsd
7.5