CVE-2019-6111
|
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
Published:
January 31, 2019; 01:29:00 PM -05:00
|
V3.0: 5.9 MEDIUM
V2: 5.8 MEDIUM
|
CVE-2019-6110
|
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
Published:
January 31, 2019; 01:29:00 PM -05:00
|
V3.0: 6.8 MEDIUM
V2: 4.0 MEDIUM
|
CVE-2019-6109
|
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
Published:
January 31, 2019; 01:29:00 PM -05:00
|
V3.0: 6.8 MEDIUM
V2: 4.0 MEDIUM
|
CVE-2018-20685
|
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
Published:
January 10, 2019; 04:29:00 PM -05:00
|
V3.0: 5.3 MEDIUM
V2: 2.6 LOW
|
CVE-2018-15473
|
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Published:
August 17, 2018; 03:29:00 PM -04:00
|
V3.0: 5.3 MEDIUM
V2: 5.0 MEDIUM
|
CVE-2016-10708
|
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
Published:
January 21, 2018; 05:29:00 PM -05:00
|
V3.0: 7.5 HIGH
V2: 5.0 MEDIUM
|
CVE-2017-15906
|
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Published:
October 25, 2017; 11:29:00 PM -04:00
|
V3.0: 5.3 MEDIUM
V2: 5.0 MEDIUM
|
CVE-2016-1908
|
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
Published:
April 11, 2017; 02:59:00 PM -04:00
|
V3.0: 9.8 CRITICAL
V2: 7.5 HIGH
|
CVE-2016-6210
|
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
Published:
February 13, 2017; 12:59:00 PM -05:00
|
V3.0: 5.9 MEDIUM
V2: 4.3 MEDIUM
|
CVE-2016-10012
|
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
Published:
January 04, 2017; 09:59:03 PM -05:00
|
V3.0: 7.8 HIGH
V2: 7.2 HIGH
|
CVE-2016-10011
|
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
Published:
January 04, 2017; 09:59:03 PM -05:00
|
V3.0: 5.5 MEDIUM
V2: 2.1 LOW
|
CVE-2016-10010
|
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
Published:
January 04, 2017; 09:59:03 PM -05:00
|
V3.0: 7.0 HIGH
V2: 6.9 MEDIUM
|
CVE-2016-10009
|
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
Published:
January 04, 2017; 09:59:03 PM -05:00
|
V3.0: 7.3 HIGH
V2: 7.5 HIGH
|
CVE-2016-6515
|
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
Published:
August 07, 2016; 05:59:09 PM -04:00
|
V3.0: 7.5 HIGH
V2: 7.8 HIGH
|
CVE-2015-8325
|
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
Published:
April 30, 2016; 09:59:00 PM -04:00
|
V3.0: 7.8 HIGH
V2: 7.2 HIGH
|
CVE-2016-3115
|
Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
Published:
March 22, 2016; 06:59:02 AM -04:00
|
V3.0: 6.4 MEDIUM
V2: 5.5 MEDIUM
|
CVE-2015-6564
|
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Published:
August 23, 2015; 09:59:01 PM -04:00
|
V2: 6.9 MEDIUM
|
CVE-2015-6563
|
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
Published:
August 23, 2015; 09:59:00 PM -04:00
|
V2: 1.9 LOW
|
CVE-2015-5600
|
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
Published:
August 02, 2015; 09:59:03 PM -04:00
|
V2: 8.5 HIGH
|
CVE-2015-5352
|
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
Published:
August 02, 2015; 09:59:01 PM -04:00
|
V2: 4.3 MEDIUM
|