Lucene search

K
Dropbear Ssh ProjectDropbear Ssh

7 matches found

CVE
CVE
added 2023/12/18 4:15 p.m.3808 views

CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connecti...

5.9CVSS6.7AI score0.67991EPSS
CVE
CVE
added 2020/12/30 8:15 p.m.242 views

CVE-2019-12953

Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.

5.3CVSS5AI score0.00672EPSS
CVE
CVE
added 2018/08/21 1:29 a.m.217 views

CVE-2018-15599

The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.

5.3CVSS5.8AI score0.90473EPSS
CVE
CVE
added 2017/03/03 4:59 p.m.144 views

CVE-2016-7409

The dbclient and server in Dropbear SSH before 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.

5.5CVSS6.7AI score0.00306EPSS
CVE
CVE
added 2013/10/25 11:55 p.m.69 views

CVE-2013-4421

The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.

5CVSS6.3AI score0.25913EPSS
CVE
CVE
added 2013/10/25 11:55 p.m.63 views

CVE-2013-4434

Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.

5CVSS6.5AI score0.03905EPSS
CVE
CVE
added 2006/03/14 1:6 a.m.55 views

CVE-2006-1206

Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined val...

5CVSS6.5AI score0.05776EPSS