Lucene search

K

5 matches found

CVE
CVE
added 2014/12/06 3:59 p.m.3128 views

CVE-2014-9278

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would for...

4CVSS5.7AI score0.00295EPSS
CVE
CVE
added 2014/01/29 4:2 p.m.2666 views

CVE-2014-1692

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors th...

7.5CVSS5.3AI score0.0756EPSS
CVE
CVE
added 2014/02/03 3:55 a.m.2502 views

CVE-2011-4327

ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.

2.1CVSS5.7AI score0.0011EPSS
CVE
CVE
added 2014/03/27 10:55 a.m.698 views

CVE-2014-2653

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

5.8CVSS5.2AI score0.0289EPSS
CVE
CVE
added 2014/03/18 5:18 a.m.561 views

CVE-2014-2532

sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.

5.8CVSS5.2AI score0.00392EPSS