OpenSSH 9.1 double-free vulnerability in options.kex_algorithms fixed in 9.2. Allows unauthenticated remote attacker to jump to any location in sshd address space. Remote code execution is theoretically possible. Requires Python 3, paramiko, colorama.
Reporter | Title | Published | Views | Family All 63 |
---|---|---|---|---|
![]() | CVE-2023-25136 | 7 Feb 202306:57 | – | redhatcve |
![]() | K000132929 : OpenSSH vulnerability CVE-2023-25136 | 10 Mar 202300:00 | – | f5 |
![]() | Fedora 37 : openssh (2023-1176c8b10c) | 18 Apr 202300:00 | – | nessus |
![]() | Fedora 38 : openssh (2023-123647648e) | 20 Apr 202300:00 | – | nessus |
![]() | EulerOS 2.0 SP10 : openssh (EulerOS-SA-2023-1981) | 18 May 202300:00 | – | nessus |
![]() | EulerOS 2.0 SP10 : openssh (EulerOS-SA-2023-1959) | 18 May 202300:00 | – | nessus |
![]() | OpenSSH 9.1 Double Free | 8 Feb 202300:00 | – | nessus |
![]() | AlmaLinux 9 : openssh (ALSA-2023:2645) | 14 May 202300:00 | – | nessus |
![]() | RHEL 9 : openssh (RHSA-2023:2645) | 13 May 202300:00 | – | nessus |
![]() | EulerOS Virtualization 2.10.0 : openssh (EulerOS-SA-2023-2479) | 28 Jul 202300:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo