Vulnerabilities > Openbsd > Openssh > High

DATE CVE VULNERABILITY TITLE RISK
2003-10-06 CVE-2003-0682 Remote Security vulnerability in OpenSSH
"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
network
low complexity
openbsd
7.5
2003-07-02 CVE-2003-0386 Unspecified vulnerability in Openbsd Openssh 3.6.1
OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.
network
low complexity
openbsd
7.5
2002-08-12 CVE-2002-0765 Authentication Implementation Error vulnerability in Openbsd and Openssh
sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.
network
low complexity
openbsd
7.5
2002-06-18 CVE-2002-0575 Buffer Overflow vulnerability in OpenSSH Kerberos 4 TGT/AFS Token
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
network
low complexity
openbsd
7.5
2001-12-31 CVE-2001-1507 Unspecified vulnerability in Openbsd Openssh 3.0/3.0P1
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
network
low complexity
openbsd
7.5
2001-12-21 CVE-2001-0872 OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
local
low complexity
openbsd redhat suse
7.2
2001-12-06 CVE-2001-0816 Unspecified vulnerability in Openbsd Openssh
OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
network
low complexity
openbsd
7.5
2001-10-18 CVE-2001-1380 Unspecified vulnerability in Openbsd Openssh
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
network
low complexity
openbsd
7.5
2001-08-22 CVE-2001-0572 The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
network
low complexity
openbsd ssh
7.5
2001-08-14 CVE-2001-0529 Symbolic Link vulnerability in OpenSSH Client X11 Forwarding Cookie Removal File
OpenSSH version 2.9 and earlier, with X forwarding enabled, allows a local attacker to delete any file named 'cookies' via a symlink attack.
local
low complexity
openbsd
7.2