openbsd CVE Vulnerabilities & Metrics

Focus on openbsd vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About openbsd Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with openbsd. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total openbsd CVEs: 88
Earliest CVE date: 24 Aug 1997, 04:00 UTC
Latest CVE date: 01 Jul 2024, 13:15 UTC

Latest CVE reference: CVE-2024-6387

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -90.91%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -90.91%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical openbsd CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.67

Max CVSS: 10.0

Critical CVEs (≥9): 31

CVSS Range vs. Count

Range Count
0.0-3.9 48
4.0-6.9 149
7.0-8.9 84
9.0-10.0 31

CVSS Distribution Chart

Top 5 Highest CVSS openbsd CVEs

These are the five CVEs with the highest CVSS scores for openbsd, sorted by severity first and recency.

All CVEs for openbsd

CVE-2024-6387 openbsd vulnerability CVSS: 0 01 Jul 2024, 13:15 UTC

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2023-51767 openbsd vulnerability CVSS: 0 24 Dec 2023, 07:15 UTC

OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.

CVE-2023-51385 openbsd vulnerability CVSS: 0 18 Dec 2023, 19:15 UTC

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

CVE-2023-51384 openbsd vulnerability CVSS: 0 18 Dec 2023, 19:15 UTC

In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.

CVE-2023-48795 openbsd vulnerability CVSS: 0 18 Dec 2023, 16:15 UTC

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

CVE-2023-40216 openbsd vulnerability CVSS: 0 10 Aug 2023, 16:15 UTC

OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.

CVE-2023-38408 openbsd vulnerability CVSS: 0 20 Jul 2023, 03:15 UTC

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVE-2023-35784 openbsd vulnerability CVSS: 0 16 Jun 2023, 20:15 UTC

A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected.

CVE-2021-46880 openbsd vulnerability CVSS: 0 15 Apr 2023, 00:15 UTC

x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded.

CVE-2022-48437 openbsd vulnerability CVSS: 0 12 Apr 2023, 05:15 UTC

An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.

CVE-2023-29323 openbsd vulnerability CVSS: 0 04 Apr 2023, 23:15 UTC

ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.

CVE-2023-28531 openbsd vulnerability CVSS: 0 17 Mar 2023, 04:15 UTC

ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.

CVE-2023-27567 openbsd vulnerability CVSS: 0 03 Mar 2023, 22:15 UTC

In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.

CVE-2023-25136 openbsd vulnerability CVSS: 0 03 Feb 2023, 06:15 UTC

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVE-2022-27882 openbsd vulnerability CVSS: 5.0 25 Mar 2022, 18:15 UTC

slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.

CVE-2022-27881 openbsd vulnerability CVSS: 5.0 25 Mar 2022, 18:15 UTC

engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.

CVE-2021-36368 openbsd vulnerability CVSS: 2.6 13 Mar 2022, 00:15 UTC

An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.

CVE-2021-41617 openbsd vulnerability CVSS: 4.4 26 Sep 2021, 19:15 UTC

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.

CVE-2021-41581 openbsd vulnerability CVSS: 4.3 24 Sep 2021, 03:15 UTC

x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.

CVE-2016-20012 openbsd vulnerability CVSS: 4.3 15 Sep 2021, 20:15 UTC

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product

CVE-2019-25049 openbsd vulnerability CVSS: 5.8 01 Jul 2021, 03:15 UTC

LibreSSL 2.9.1 through 3.2.1 has an out-of-bounds read in asn1_item_print_ctx (called from asn1_template_print_ctx).

CVE-2019-25048 openbsd vulnerability CVSS: 5.8 01 Jul 2021, 03:15 UTC

LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).

CVE-2010-4816 openbsd vulnerability CVSS: 5.0 22 Jun 2021, 14:15 UTC

It was found in FreeBSD 8.0, 6.3 and 4.9, and OpenBSD 4.6 that a null pointer dereference in ftpd/popen.c may lead to remote denial of service of the ftpd service.

CVE-2020-26142 openbsd vulnerability CVSS: 2.6 11 May 2021, 20:15 UTC

An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVE-2021-28041 openbsd vulnerability CVSS: 4.6 05 Mar 2021, 21:15 UTC

ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.

CVE-2020-16088 openbsd vulnerability CVSS: 7.5 28 Jul 2020, 12:15 UTC

iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.

CVE-2020-15778 openbsd vulnerability CVSS: 6.8 24 Jul 2020, 14:15 UTC

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."

CVE-2020-14145 openbsd vulnerability CVSS: 4.3 29 Jun 2020, 18:15 UTC

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVE-2020-12062 openbsd vulnerability CVSS: 5.0 01 Jun 2020, 16:15 UTC

The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.

CVE-2011-3336 openbsd vulnerability CVSS: 7.8 12 Feb 2020, 20:15 UTC

regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.

CVE-2020-7247 openbsd vulnerability CVSS: 10.0 29 Jan 2020, 16:15 UTC

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVE-2015-5333 openbsd vulnerability CVSS: 5.0 23 Jan 2020, 21:15 UTC

Memory leak in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (memory consumption) via a large number of ASN.1 object identifiers in X.509 certificates.

CVE-2015-5334 openbsd vulnerability CVSS: 7.5 23 Jan 2020, 20:15 UTC

Off-by-one error in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (program crash) or possible execute arbitrary code via a crafted X.509 certificate, which triggers a stack-based buffer overflow. Note: this vulnerability exists because of an incorrect fix for CVE-2014-3508.

CVE-2012-5663 openbsd vulnerability CVSS: 5.0 30 Dec 2019, 22:15 UTC

The isearch package (textproc/isearch) before 1.47.01nb1 uses the tempnam() function to create insecure temporary files into a publicly-writable area (/tmp).

CVE-2019-19726 openbsd vulnerability CVSS: 7.2 12 Dec 2019, 01:15 UTC

OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.

CVE-2019-14899 openbsd vulnerability CVSS: 4.9 11 Dec 2019, 15:15 UTC

A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.

CVE-2012-1577 openbsd vulnerability CVSS: 7.5 10 Dec 2019, 19:15 UTC

lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.

CVE-2019-19522 openbsd vulnerability CVSS: 7.2 05 Dec 2019, 00:15 UTC

OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.

CVE-2019-19521 openbsd vulnerability CVSS: 7.5 05 Dec 2019, 00:15 UTC

libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).

CVE-2019-19520 openbsd vulnerability CVSS: 4.6 05 Dec 2019, 00:15 UTC

xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.

CVE-2019-19519 openbsd vulnerability CVSS: 4.6 05 Dec 2019, 00:15 UTC

In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.

CVE-2019-16905 openbsd vulnerability CVSS: 4.4 09 Oct 2019, 20:15 UTC

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

CVE-2019-8460 openbsd vulnerability CVSS: 5.0 26 Aug 2019, 20:15 UTC

OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.

CVE-2019-6111 openbsd vulnerability CVSS: 5.8 31 Jan 2019, 18:29 UTC

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

CVE-2019-6110 openbsd vulnerability CVSS: 4.0 31 Jan 2019, 18:29 UTC

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

CVE-2019-6109 openbsd vulnerability CVSS: 4.0 31 Jan 2019, 18:29 UTC

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

CVE-2018-20685 openbsd vulnerability CVSS: 2.6 10 Jan 2019, 21:29 UTC

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

CVE-2018-15919 openbsd vulnerability CVSS: 5.0 28 Aug 2018, 08:29 UTC

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'

CVE-2018-15473 openbsd vulnerability CVSS: 5.0 17 Aug 2018, 19:29 UTC

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

CVE-2018-14775 openbsd vulnerability CVSS: 4.9 01 Aug 2018, 06:29 UTC

tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture.

CVE-2018-12434 openbsd vulnerability CVSS: 1.9 15 Jun 2018, 02:29 UTC

LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CVE-2018-8970 openbsd vulnerability CVSS: 5.8 24 Mar 2018, 21:29 UTC

The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.

CVE-2016-10708 openbsd vulnerability CVSS: 5.0 21 Jan 2018, 22:29 UTC

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

CVE-2017-15906 openbsd vulnerability CVSS: 5.0 26 Oct 2017, 03:29 UTC

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVE-2015-7687 openbsd vulnerability CVSS: 7.5 16 Oct 2017, 18:29 UTC

Use-after-free vulnerability in OpenSMTPD before 5.7.2 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving req_ca_vrfy_smtp and req_ca_vrfy_mta.

CVE-2017-1000373 openbsd vulnerability CVSS: 6.4 19 Jun 2017, 16:29 UTC

The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects OpenBSD 6.1 and possibly earlier versions.

CVE-2017-1000372 openbsd vulnerability CVSS: 7.5 19 Jun 2017, 16:29 UTC

A flaw exists in OpenBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions.

CVE-2017-8301 openbsd vulnerability CVSS: 2.6 27 Apr 2017, 17:59 UTC

LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx.

CVE-2016-1908 openbsd vulnerability CVSS: 7.5 11 Apr 2017, 18:59 UTC

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.

CVE-2017-5850 openbsd vulnerability CVSS: 7.8 27 Mar 2017, 15:59 UTC

httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header.

CVE-2016-6522 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

Integer overflow in the uvm_map_isavail function in uvm/uvm_map.c in OpenBSD 5.9 allows local users to cause a denial of service (kernel panic) via a crafted mmap call, which triggers the new mapping to overlap with an existing mapping.

CVE-2016-6350 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (NULL pointer dereference and panic) via a sysctl call with a path starting with 10,9.

CVE-2016-6247 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

OpenBSD 5.8 and 5.9 allows certain local users to cause a denial of service (kernel panic) by unmounting a filesystem with an open vnode on the mnt_vnodelist.

CVE-2016-6246 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

OpenBSD 5.8 and 5.9 allows certain local users with kern.usermount privileges to cause a denial of service (kernel panic) by mounting a tmpfs with a VNOVAL in the (1) username, (2) groupname, or (3) device name of the root node.

CVE-2016-6245 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a large size in a getdents system call.

CVE-2016-6243 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

thrsleep in kern/kern_synch.c in OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a crafted value in the tsp parameter of the __thrsleep system call.

CVE-2016-6242 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (assertion failure and kernel panic) via a large ident value in a kevent system call.

CVE-2016-6241 openbsd vulnerability CVSS: 7.2 07 Mar 2017, 16:59 UTC

Integer overflow in the amap_alloc1 function in OpenBSD 5.8 and 5.9 allows local users to execute arbitrary code with kernel privileges via a large size value.

CVE-2016-6240 openbsd vulnerability CVSS: 7.2 07 Mar 2017, 16:59 UTC

Integer truncation error in the amap_alloc function in OpenBSD 5.8 and 5.9 allows local users to execute arbitrary code with kernel privileges via a large size value.

CVE-2016-6239 openbsd vulnerability CVSS: 4.9 07 Mar 2017, 16:59 UTC

The mmap extension __MAP_NOFAULT in OpenBSD 5.8 and 5.9 allows attackers to cause a denial of service (kernel panic and crash) via a large size value.

CVE-2016-6244 openbsd vulnerability CVSS: 7.8 07 Mar 2017, 15:59 UTC

The sys_thrsigdivert function in kern/kern_sig.c in the OpenBSD kernel 5.9 allows remote attackers to cause a denial of service (panic) via a negative "ts.tv_sec" value.

CVE-2016-6210 openbsd vulnerability CVSS: 4.3 13 Feb 2017, 17:59 UTC

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVE-2016-10012 openbsd vulnerability CVSS: 7.2 05 Jan 2017, 02:59 UTC

The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.

CVE-2016-10011 openbsd vulnerability CVSS: 2.1 05 Jan 2017, 02:59 UTC

authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.

CVE-2016-10010 openbsd vulnerability CVSS: 6.9 05 Jan 2017, 02:59 UTC

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

CVE-2016-10009 openbsd vulnerability CVSS: 7.5 05 Jan 2017, 02:59 UTC

Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.

CVE-2016-8858 openbsd vulnerability CVSS: 7.8 09 Dec 2016, 11:59 UTC

The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."

CVE-2016-6515 openbsd vulnerability CVSS: 7.8 07 Aug 2016, 21:59 UTC

The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.

CVE-2015-8325 openbsd vulnerability CVSS: 7.2 01 May 2016, 01:59 UTC

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

CVE-2016-3115 openbsd vulnerability CVSS: 5.5 22 Mar 2016, 10:59 UTC

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVE-2016-1907 openbsd vulnerability CVSS: 5.0 19 Jan 2016, 05:59 UTC

The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.

CVE-2016-0778 openbsd vulnerability CVSS: 4.6 14 Jan 2016, 22:59 UTC

The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.

CVE-2016-0777 openbsd vulnerability CVSS: 4.0 14 Jan 2016, 22:59 UTC

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.

CVE-2015-6565 openbsd vulnerability CVSS: 7.2 24 Aug 2015, 01:59 UTC

sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.

CVE-2015-6564 openbsd vulnerability CVSS: 6.9 24 Aug 2015, 01:59 UTC

Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

CVE-2015-6563 openbsd vulnerability CVSS: 1.9 24 Aug 2015, 01:59 UTC

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

CVE-2015-5600 openbsd vulnerability CVSS: 8.5 03 Aug 2015, 01:59 UTC

The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.

CVE-2015-5352 openbsd vulnerability CVSS: 4.3 03 Aug 2015, 01:59 UTC

The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

CVE-2014-9424 openbsd vulnerability CVSS: 7.5 29 Dec 2014, 00:59 UTC

Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.

CVE-2014-7250 openbsd vulnerability CVSS: 5.0 12 Dec 2014, 03:03 UTC

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.

CVE-2014-9278 openbsd vulnerability CVSS: 4.0 06 Dec 2014, 15:59 UTC

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

CVE-2013-2125 openbsd vulnerability CVSS: 5.0 27 May 2014, 14:55 UTC

OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which allows remote attackers to cause a denial of service (connection blocking) by keeping a connection open.

CVE-2014-2653 openbsd vulnerability CVSS: 5.8 27 Mar 2014, 10:55 UTC

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

CVE-2014-2532 openbsd vulnerability CVSS: 5.8 18 Mar 2014, 05:18 UTC

sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.

CVE-2011-4327 openbsd vulnerability CVSS: 2.1 03 Feb 2014, 03:55 UTC

ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.

CVE-2014-1692 openbsd vulnerability CVSS: 7.5 29 Jan 2014, 16:02 UTC

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.

CVE-2013-4548 openbsd vulnerability CVSS: 6.0 08 Nov 2013, 15:55 UTC

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

CVE-2010-5107 openbsd vulnerability CVSS: 5.0 07 Mar 2013, 20:55 UTC

The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.

CVE-2011-5000 openbsd vulnerability CVSS: 3.5 05 Apr 2012, 14:55 UTC

The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

CVE-2012-0814 openbsd vulnerability CVSS: 3.5 27 Jan 2012, 19:55 UTC

The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.

CVE-2011-2895 openbsd vulnerability CVSS: 9.3 19 Aug 2011, 17:55 UTC

The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.

CVE-2011-2168 openbsd vulnerability CVSS: 5.0 24 May 2011, 23:55 UTC

Multiple integer overflows in the glob implementation in libc in OpenBSD before 4.9 might allow context-dependent attackers to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.

CVE-2011-0419 openbsd vulnerability CVSS: 4.3 16 May 2011, 17:55 UTC

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.

CVE-2011-1013 openbsd vulnerability CVSS: 7.2 09 May 2011, 19:55 UTC

Integer signedness error in the drm_modeset_ctl function in (1) drivers/gpu/drm/drm_irq.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.38 and (2) sys/dev/pci/drm/drm_irq.c in the kernel in OpenBSD before 4.9 allows local users to trigger out-of-bounds write operations, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via a crafted num_crtcs (aka vb_num) structure member in an ioctl argument.

CVE-2010-4755 openbsd vulnerability CVSS: 4.0 02 Mar 2011, 20:00 UTC

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.

CVE-2010-4754 openbsd vulnerability CVSS: 4.0 02 Mar 2011, 20:00 UTC

The glob implementation in libc in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, and OpenBSD 4.7, and Libsystem in Apple Mac OS X before 10.6.8, allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.

CVE-2011-0539 openbsd vulnerability CVSS: 5.0 10 Feb 2011, 18:00 UTC

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

CVE-2010-4478 openbsd vulnerability CVSS: 7.5 06 Dec 2010, 22:30 UTC

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.

CVE-2009-3572 openbsd vulnerability CVSS: 4.9 06 Oct 2009, 20:30 UTC

OpenBSD 4.4, 4.5, and 4.6, when running on an i386 kernel, does not properly handle XMM exceptions, which allows local users to cause a denial of service (kernel panic) via unspecified vectors.

CVE-2009-2904 openbsd vulnerability CVSS: 6.9 01 Oct 2009, 15:30 UTC

A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.

CVE-2009-0687 openbsd vulnerability CVSS: 7.8 11 Aug 2009, 10:30 UTC

The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

CVE-2009-0689 openbsd vulnerability CVSS: 6.8 01 Jul 2009, 13:00 UTC

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

CVE-2009-0537 openbsd vulnerability CVSS: 4.9 09 Mar 2009, 21:30 UTC

Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.

CVE-2009-0780 openbsd vulnerability CVSS: 5.0 04 Mar 2009, 11:30 UTC

The aspath_prepend function in rde_attr.c in bgpd in OpenBSD 4.3 and 4.4 allows remote attackers to cause a denial of service (application crash) via an Autonomous System (AS) advertisement containing a long AS path.

CVE-2008-5161 openbsd vulnerability CVSS: 2.6 19 Nov 2008, 17:30 UTC

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.

CVE-2008-4609 openbsd vulnerability CVSS: 7.1 20 Oct 2008, 17:59 UTC

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.

CVE-2008-2476 openbsd vulnerability CVSS: 9.3 03 Oct 2008, 15:07 UTC

The IPv6 Neighbor Discovery Protocol (NDP) implementation in (1) FreeBSD 6.3 through 7.1, (2) OpenBSD 4.2 and 4.3, (3) NetBSD, (4) Force10 FTOS before E7.7.1.1, (5) Juniper JUNOS, and (6) Wind River VxWorks 5.x through 6.4 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic via a spoofed message that modifies the Forward Information Base (FIB).

CVE-2008-4247 openbsd vulnerability CVSS: 7.5 25 Sep 2008, 19:25 UTC

ftpd in OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0, Solaris, and possibly other operating systems interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.

CVE-2008-4109 openbsd vulnerability CVSS: 5.0 18 Sep 2008, 15:04 UTC

A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.

CVE-2008-3844 openbsd vulnerability CVSS: 9.3 27 Aug 2008, 20:41 UTC

Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.

CVE-2008-3259 openbsd vulnerability CVSS: 1.2 22 Jul 2008, 16:41 UTC

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

CVE-2008-3234 openbsd vulnerability CVSS: 6.5 18 Jul 2008, 16:41 UTC

sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.

CVE-2008-1657 openbsd vulnerability CVSS: 6.5 02 Apr 2008, 18:44 UTC

OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.

CVE-2008-1483 openbsd vulnerability CVSS: 6.9 24 Mar 2008, 23:44 UTC

OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.

CVE-2008-1215 openbsd vulnerability CVSS: 4.6 09 Mar 2008, 02:44 UTC

Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~" characters.

CVE-2008-1057 openbsd vulnerability CVSS: 7.8 28 Feb 2008, 19:44 UTC

The ip6_check_rh0hdr function in netinet6/ip6_input.c in OpenBSD 4.2 allows attackers to cause a denial of service (panic) via malformed IPv6 routing headers.

CVE-2008-1058 openbsd vulnerability CVSS: 7.8 28 Feb 2008, 19:44 UTC

The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets. NOTE: some of these details are obtained from third party information.

CVE-2007-6700 openbsd vulnerability CVSS: 4.3 05 Feb 2008, 02:00 UTC

Cross-site scripting (XSS) vulnerability in cgi-bin/bgplg in the web interface for the BGPD daemon in OpenBSD 4.1 allows remote attackers to inject arbitrary web script or HTML via the cmd parameter.

CVE-2008-0384 openbsd vulnerability CVSS: 4.9 22 Jan 2008, 20:00 UTC

OpenBSD 4.2 allows local users to cause a denial of service (kernel panic) by calling the SIOCGIFRTLABEL IOCTL on an interface that does not have a route label, which triggers a NULL pointer dereference when the return value from the rtlabel_id2name function is not checked.

CVE-2007-3102 openbsd vulnerability CVSS: 4.3 18 Oct 2007, 20:17 UTC

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.

CVE-2007-5365 openbsd vulnerability CVSS: 7.2 11 Oct 2007, 10:17 UTC

Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

CVE-2007-4752 openbsd vulnerability CVSS: 7.5 12 Sep 2007, 01:17 UTC

ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.

CVE-2007-4654 openbsd vulnerability CVSS: 5.0 04 Sep 2007, 22:17 UTC

Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via a series of large packets designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144), possibly a related issue to CVE-2002-1024.

CVE-2007-2768 openbsd vulnerability CVSS: 4.3 21 May 2007, 20:30 UTC

OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

CVE-2007-2243 openbsd vulnerability CVSS: 5.0 25 Apr 2007, 16:19 UTC

OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.

CVE-2007-1351 openbsd vulnerability CVSS: 8.5 06 Apr 2007, 01:19 UTC

Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.

CVE-2007-1352 openbsd vulnerability CVSS: 3.8 06 Apr 2007, 01:19 UTC

Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.

CVE-2007-1365 openbsd vulnerability CVSS: 10.0 10 Mar 2007, 21:19 UTC

Buffer overflow in kern/uipc_mbuf2.c in OpenBSD 3.9 and 4.0 allows remote attackers to execute arbitrary code via fragmented IPv6 packets due to "incorrect mbuf handling for ICMP6 packets." NOTE: this was originally reported as a denial of service.

CVE-2007-0343 openbsd vulnerability CVSS: 5.0 18 Jan 2007, 02:28 UTC

OpenBSD before 20070116 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via certain IPv6 ICMP (aka ICMP6) echo request packets.

CVE-2007-0085 openbsd vulnerability CVSS: 6.0 05 Jan 2007, 11:28 UTC

Unspecified vulnerability in sys/dev/pci/vga_pci.c in the VGA graphics driver for wscons in OpenBSD 3.9 and 4.0, when the kernel is compiled with the PCIAGP option and a non-AGP device is being used, allows local users to gain privileges via unspecified vectors, possibly related to agp_ioctl NULL pointer reference.

CVE-2006-6730 openbsd vulnerability CVSS: 6.6 26 Dec 2006, 23:28 UTC

OpenBSD and NetBSD permit usermode code to kill the display server and write to the X.Org /dev/xf86 device, which allows local users with root privileges to reduce securelevel by replacing the System Management Mode (SMM) handler via a write to an SMRAM address within /dev/xf86 (aka the video card memory-mapped I/O range), and then launching the new handler via a System Management Interrupt (SMI), as demonstrated by a write to Programmed I/O port 0xB2.

CVE-2006-6397 openbsd vulnerability CVSS: 4.4 08 Dec 2006, 01:28 UTC

Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operations. This issue is not a vulnerability

CVE-2006-6164 openbsd vulnerability CVSS: 7.2 29 Nov 2006, 01:28 UTC

The _dl_unsetenv function in loader.c in the ELF ld.so in OpenBSD 3.9 and 4.0 does not properly remove duplicate environment variables, which allows local users to pass dangerous variables such as LD_PRELOAD to loading processes, which might be leveraged to gain privileges.

CVE-2006-5794 openbsd vulnerability CVSS: 7.5 08 Nov 2006, 20:07 UTC

Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.

CVE-2006-5550 openbsd vulnerability CVSS: 4.9 26 Oct 2006, 17:07 UTC

The kernel in FreeBSD 6.1 and OpenBSD 4.0 allows local users to cause a denial of service via unspecified vectors involving certain ioctl requests to /dev/crypto.

CVE-2006-5229 openbsd vulnerability CVSS: 2.6 10 Oct 2006, 23:07 UTC

OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.

CVE-2006-5218 openbsd vulnerability CVSS: 4.6 10 Oct 2006, 04:06 UTC

Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl.

CVE-2006-4925 openbsd vulnerability CVSS: 5.0 29 Sep 2006, 00:07 UTC

packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.

CVE-2006-5051 openbsd vulnerability CVSS: 9.3 27 Sep 2006, 23:07 UTC

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

CVE-2006-5052 openbsd vulnerability CVSS: 5.0 27 Sep 2006, 23:07 UTC

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

CVE-2006-4924 openbsd vulnerability CVSS: 7.8 27 Sep 2006, 01:07 UTC

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

CVE-2006-4436 openbsd vulnerability CVSS: 5.0 29 Aug 2006, 00:04 UTC

isakmpd in OpenBSD 3.8, 3.9, and possibly earlier versions, creates Security Associations (SA) with a replay window of size 0 when isakmpd acts as a responder during SA negotiation, which allows remote attackers to replay IPSec packets and bypass the replay protection.

CVE-2006-4435 openbsd vulnerability CVSS: 4.9 29 Aug 2006, 00:04 UTC

OpenBSD 3.8, 3.9, and possibly earlier versions allows context-dependent attackers to cause a denial of service (kernel panic) by allocating more semaphores than the default.

CVE-2006-4304 openbsd vulnerability CVSS: 10.0 24 Aug 2006, 01:04 UTC

Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the overflow in (1) pppoe and (2) ippp. NOTE: this issue was originally incorrectly reported for the ppp driver.

CVE-2006-0883 openbsd vulnerability CVSS: 5.0 07 Mar 2006, 02:02 UTC

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.

CVE-2006-0225 openbsd vulnerability CVSS: 4.6 25 Jan 2006, 11:03 UTC

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

CVE-2006-0098 openbsd vulnerability CVSS: 4.6 06 Jan 2006, 11:03 UTC

The dupfdopen function in sys/kern/kern_descrip.c in OpenBSD 3.7 and 3.8 allows local users to re-open arbitrary files by using setuid programs to access file descriptors using /dev/fd/.

CVE-2005-4351 openbsd vulnerability CVSS: 4.3 31 Dec 2005, 05:00 UTC

The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.

CVE-2005-2797 openbsd vulnerability CVSS: 5.0 06 Sep 2005, 17:03 UTC

OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.

CVE-2005-2798 openbsd vulnerability CVSS: 5.0 06 Sep 2005, 17:03 UTC

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

CVE-2005-2666 openbsd vulnerability CVSS: 1.2 23 Aug 2005, 04:00 UTC

SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.

CVE-2005-0356 openbsd vulnerability CVSS: 5.0 31 May 2005, 04:00 UTC

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.

CVE-2005-0637 openbsd vulnerability CVSS: 5.0 02 May 2005, 04:00 UTC

The copy functions in locore.s such as copyout in OpenBSD 3.5 and 3.6, and possibly other BSD based operating systems, may allow attackers to exceed certain address boundaries and modify kernel memory.

CVE-2005-0960 openbsd vulnerability CVSS: 5.0 02 May 2005, 04:00 UTC

Multiple vulnerabilities in the SACK functionality in (1) tcp_input.c and (2) tcp_usrreq.c OpenBSD 3.5 and 3.6 allow remote attackers to cause a denial of service (memory exhaustion or system crash).

CVE-2005-0740 openbsd vulnerability CVSS: 5.0 13 Jan 2005, 05:00 UTC

The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote attackers to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.

CVE-2004-1799 openbsd vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.

CVE-2004-2163 openbsd vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote attackers to bypass authentication by spoofing server replies.

CVE-2004-2338 openbsd vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

OpenBSD 3.3 and 3.4 does not properly parse Accept and Deny rules without netmasks on big-endian 64-bit platforms such as SPARC64, which may allow remote attackers to bypass access restrictions.

CVE-2004-1471 openbsd vulnerability CVSS: 7.1 31 Dec 2004, 05:00 UTC

Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line.

CVE-2004-2760 openbsd vulnerability CVSS: 6.8 31 Dec 2004, 05:00 UTC

sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190. NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.

CVE-2004-2069 openbsd vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).

CVE-2004-2230 openbsd vulnerability CVSS: 2.1 31 Dec 2004, 05:00 UTC

Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.

CVE-2004-0079 openbsd vulnerability CVSS: 5.0 23 Nov 2004, 05:00 UTC

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

CVE-2004-0081 openbsd vulnerability CVSS: 5.0 23 Nov 2004, 05:00 UTC

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.

CVE-2004-0112 openbsd vulnerability CVSS: 5.0 23 Nov 2004, 05:00 UTC

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.

CVE-2004-0257 openbsd vulnerability CVSS: 5.0 23 Nov 2004, 05:00 UTC

OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote attackers to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.

CVE-2004-0687 openbsd vulnerability CVSS: 7.5 20 Oct 2004, 04:00 UTC

Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.

CVE-2004-0688 openbsd vulnerability CVSS: 7.5 20 Oct 2004, 04:00 UTC

Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.

CVE-2004-1653 openbsd vulnerability CVSS: 6.4 31 Aug 2004, 04:00 UTC

The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.

CVE-2004-0819 openbsd vulnerability CVSS: 5.0 25 Aug 2004, 04:00 UTC

The bridge functionality in OpenBSD 3.4 and 3.5, when running a gateway configured as a bridging firewall with the link2 option for IPSec enabled, allows remote attackers to cause a denial of service (crash) via an ICMP echo (ping) packet.

CVE-2004-0175 openbsd vulnerability CVSS: 4.3 18 Aug 2004, 04:00 UTC

Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992.

CVE-2004-0414 openbsd vulnerability CVSS: 10.0 06 Aug 2004, 04:00 UTC

CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle malformed "Entry" lines, which prevents a NULL terminator from being used and may lead to a denial of service (crash), modification of critical program data, or arbitrary code execution.

CVE-2004-0416 openbsd vulnerability CVSS: 10.0 06 Aug 2004, 04:00 UTC

Double free vulnerability for the error_prog_name string in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to execute arbitrary code.

CVE-2004-0418 openbsd vulnerability CVSS: 10.0 06 Aug 2004, 04:00 UTC

serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.

CVE-2004-0492 openbsd vulnerability CVSS: 10.0 06 Aug 2004, 04:00 UTC

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

CVE-2004-0417 openbsd vulnerability CVSS: 5.0 06 Aug 2004, 04:00 UTC

Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.

CVE-2004-0482 openbsd vulnerability CVSS: 4.6 07 Jul 2004, 04:00 UTC

Multiple integer overflows in (1) procfs_cmdline.c, (2) procfs_fpregs.c, (3) procfs_linux.c, (4) procfs_regs.c, (5) procfs_status.c, and (6) procfs_subr.c in procfs for OpenBSD 3.5 and earlier allow local users to read sensitive kernel memory and possibly perform other unauthorized activities.

CVE-2004-0220 openbsd vulnerability CVSS: 10.0 04 May 2004, 04:00 UTC

isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service via an ISAKMP packet with a malformed Cert Request payload, which causes an integer underflow that is used in a malloc operation that is not properly handled, as demonstrated by the Striker ISAKMP Protocol Test Suite.

CVE-2004-0218 openbsd vulnerability CVSS: 5.0 04 May 2004, 04:00 UTC

isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (infinite loop) via an ISAKMP packet with a zero-length payload, as demonstrated by the Striker ISAKMP Protocol Test Suite.

CVE-2004-0219 openbsd vulnerability CVSS: 5.0 04 May 2004, 04:00 UTC

isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with a malformed IPSEC SA payload, as demonstrated by the Striker ISAKMP Protocol Test Suite.

CVE-2004-0221 openbsd vulnerability CVSS: 5.0 04 May 2004, 04:00 UTC

isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with a delete payload containing a large number of SPIs, which triggers an out-of-bounds read error, as demonstrated by the Striker ISAKMP Protocol Test Suite.

CVE-2004-0222 openbsd vulnerability CVSS: 5.0 04 May 2004, 04:00 UTC

Multiple memory leaks in isakmpd in OpenBSD 3.4 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via certain ISAKMP packets, as demonstrated by the Striker ISAKMP Protocol Test Suite.

CVE-2004-0171 openbsd vulnerability CVSS: 5.0 15 Mar 2004, 05:00 UTC

FreeBSD 5.1 and earlier, and Mac OS X before 10.3.4, allows remote attackers to cause a denial of service (resource exhaustion of memory buffers and system crash) via a large number of out-of-sequence TCP packets, which prevents the operating system from creating new connections.

CVE-2004-0083 openbsd vulnerability CVSS: 10.0 03 Mar 2004, 05:00 UTC

Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.

CVE-2004-0084 openbsd vulnerability CVSS: 10.0 03 Mar 2004, 05:00 UTC

Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.

CVE-2004-0106 openbsd vulnerability CVSS: 7.2 03 Mar 2004, 05:00 UTC

Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.

CVE-2004-0114 openbsd vulnerability CVSS: 4.6 03 Mar 2004, 05:00 UTC

The shmat system call in the System V Shared Memory interface for FreeBSD 5.2 and earlier, NetBSD 1.3 and earlier, and OpenBSD 2.6 and earlier, does not properly decrement a shared memory segment's reference count when the vm_map_find function fails, which could allow local users to gain read or write access to a portion of kernel memory and gain privileges.

CVE-2004-1082 openbsd vulnerability CVSS: 7.5 03 Feb 2004, 05:00 UTC

mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials.

CVE-2003-1562 openbsd vulnerability CVSS: 7.6 31 Dec 2003, 05:00 UTC

sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.

CVE-2003-1366 openbsd vulnerability CVSS: 3.3 31 Dec 2003, 05:00 UTC

chpass in OpenBSD 2.0 through 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.

CVE-2003-0955 openbsd vulnerability CVSS: 4.6 15 Dec 2003, 05:00 UTC

OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.

CVE-2003-0786 openbsd vulnerability CVSS: 10.0 17 Nov 2003, 05:00 UTC

The SSH1 PAM challenge response authentication in OpenSSH 3.7.1 and 3.7.1p1, when Privilege Separation is disabled, does not check the result of the authentication attempt, which can allow remote attackers to gain privileges.

CVE-2003-0787 openbsd vulnerability CVSS: 7.5 17 Nov 2003, 05:00 UTC

The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.

CVE-2003-0804 openbsd vulnerability CVSS: 5.0 17 Nov 2003, 05:00 UTC

The arplookup function in FreeBSD 5.1 and earlier, Mac OS X before 10.2.8, and possibly other BSD-based systems, allows remote attackers on a local subnet to cause a denial of service (resource starvation and panic) via a flood of spoofed ARP requests.

CVE-2003-0688 openbsd vulnerability CVSS: 5.0 20 Oct 2003, 04:00 UTC

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.

CVE-2003-0681 openbsd vulnerability CVSS: 7.5 06 Oct 2003, 04:00 UTC

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

CVE-2003-0682 openbsd vulnerability CVSS: 7.5 06 Oct 2003, 04:00 UTC

"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.

CVE-2003-0695 openbsd vulnerability CVSS: 7.5 06 Oct 2003, 04:00 UTC

Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.

CVE-2003-0693 openbsd vulnerability CVSS: 10.0 22 Sep 2003, 04:00 UTC

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

CVE-2003-0466 openbsd vulnerability CVSS: 10.0 27 Aug 2003, 04:00 UTC

Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.

CVE-2003-0386 openbsd vulnerability CVSS: 7.5 02 Jul 2003, 04:00 UTC

OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.

CVE-2003-0190 openbsd vulnerability CVSS: 5.0 12 May 2003, 04:00 UTC

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.

CVE-2002-1420 openbsd vulnerability CVSS: 7.2 11 Apr 2003, 04:00 UTC

Integer signedness error in select() on OpenBSD 3.1 and earlier allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a data copying operation.

CVE-2003-0144 openbsd vulnerability CVSS: 7.2 31 Mar 2003, 05:00 UTC

Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name.

CVE-2003-0028 openbsd vulnerability CVSS: 7.5 25 Mar 2003, 05:00 UTC

Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.

CVE-2003-0078 openbsd vulnerability CVSS: 5.0 03 Mar 2003, 05:00 UTC

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

CVE-2002-2180 openbsd vulnerability CVSS: 6.8 31 Dec 2002, 05:00 UTC

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

CVE-2002-2222 openbsd vulnerability CVSS: 5.1 31 Dec 2002, 05:00 UTC

isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote attackers to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence.

CVE-2002-2188 openbsd vulnerability CVSS: 4.9 31 Dec 2002, 05:00 UTC

OpenBSD before 3.2 allows local users to cause a denial of service (kernel crash) via a call to getrlimit(2) with invalid arguments, possibly due to an integer signedness error.

CVE-2002-2092 openbsd vulnerability CVSS: 3.7 31 Dec 2002, 05:00 UTC

Race condition in exec in OpenBSD 4.0 and earlier, NetBSD 1.5.2 and earlier, and FreeBSD 4.4 and earlier allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.

CVE-2002-1915 openbsd vulnerability CVSS: 2.1 31 Dec 2002, 05:00 UTC

tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.

CVE-2002-2280 openbsd vulnerability CVSS: 2.1 31 Dec 2002, 05:00 UTC

syslogd on OpenBSD 2.9 through 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server.

CVE-2002-1345 openbsd vulnerability CVSS: 5.0 23 Dec 2002, 05:00 UTC

Directory traversal vulnerabilities in multiple FTP clients on UNIX systems allow remote malicious FTP servers to create or overwrite files as the client user via filenames containing /absolute/path or .. (dot dot) sequences.

CVE-2002-1219 openbsd vulnerability CVSS: 7.5 29 Nov 2002, 05:00 UTC

Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).

CVE-2002-1220 openbsd vulnerability CVSS: 5.0 29 Nov 2002, 05:00 UTC

BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.

CVE-2002-1221 openbsd vulnerability CVSS: 5.0 29 Nov 2002, 05:00 UTC

BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.

CVE-2002-0391 openbsd vulnerability CVSS: 10.0 12 Aug 2002, 04:00 UTC

Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.

CVE-2002-0414 openbsd vulnerability CVSS: 7.5 12 Aug 2002, 04:00 UTC

KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 packets.

CVE-2002-0765 openbsd vulnerability CVSS: 7.5 12 Aug 2002, 04:00 UTC

sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.

CVE-2000-1208 openbsd vulnerability CVSS: 7.2 12 Aug 2002, 04:00 UTC

Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.

CVE-2002-0766 openbsd vulnerability CVSS: 7.2 12 Aug 2002, 04:00 UTC

OpenBSD 2.9 through 3.1 allows local users to cause a denial of service (resource exhaustion) and gain root privileges by filling the kernel's file descriptor table and closing file descriptors 0, 1, or 2 before executing a privileged process, which is not properly handled when OpenBSD fails to open an alternate descriptor.

CVE-2002-0514 openbsd vulnerability CVSS: 5.0 12 Aug 2002, 04:00 UTC

PF in OpenBSD 3.0 with the return-rst rule sets the TTL to 128 in the RST packet, which allows remote attackers to determine if a port is being filtered because the TTL is different than the default TTL.

CVE-2002-0701 openbsd vulnerability CVSS: 2.1 23 Jul 2002, 04:00 UTC

ktrace in BSD-based operating systems allows the owner of a process with special privileges to trace the process after its privileges have been lowered, which may allow the owner to obtain sensitive information that the process obtained while it was running with the extra privileges.

CVE-2002-0639 openbsd vulnerability CVSS: 10.0 03 Jul 2002, 04:00 UTC

Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.

CVE-2002-0640 openbsd vulnerability CVSS: 10.0 03 Jul 2002, 04:00 UTC

Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).

CVE-2002-0557 openbsd vulnerability CVSS: 7.5 03 Jul 2002, 04:00 UTC

Vulnerability in OpenBSD 3.0, when using YP with netgroups in the password database, causes (1) rexec or (2) rsh to run another user's shell, or (3) atrun to change to a different user's directory, possibly due to memory allocation failures or an incorrect call to auth_approval().

CVE-2002-0542 openbsd vulnerability CVSS: 7.2 03 Jul 2002, 04:00 UTC

mail in OpenBSD 2.9 and 3.0 processes a tilde (~) escape character in a message even when it is not in interactive mode, which could allow local users to gain root privileges via calls to mail in cron.

CVE-2002-0572 openbsd vulnerability CVSS: 7.2 03 Jul 2002, 04:00 UTC

FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.

CVE-2002-0381 openbsd vulnerability CVSS: 5.0 25 Jun 2002, 04:00 UTC

The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.

CVE-2002-0575 openbsd vulnerability CVSS: 7.5 18 Jun 2002, 04:00 UTC

Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.

CVE-2002-0083 openbsd vulnerability CVSS: 10.0 15 Mar 2002, 05:00 UTC

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.

CVE-2001-1507 openbsd vulnerability CVSS: 7.5 31 Dec 2001, 05:00 UTC

OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.

CVE-2001-1585 openbsd vulnerability CVSS: 6.8 31 Dec 2001, 05:00 UTC

SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.

CVE-2001-1559 openbsd vulnerability CVSS: 2.1 31 Dec 2001, 05:00 UTC

The uipc system calls (uipc_syscalls.c) in OpenBSD 2.9 and 3.0 provide user mode return instead of versus rval kernel mode values to the fdrelease function, which allows local users to cause a denial of service and trigger a null dereference.

CVE-2001-0872 openbsd vulnerability CVSS: 7.2 21 Dec 2001, 05:00 UTC

OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.

CVE-2001-0816 openbsd vulnerability CVSS: 7.5 06 Dec 2001, 05:00 UTC

OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.

CVE-2001-1415 openbsd vulnerability CVSS: 4.6 13 Nov 2001, 05:00 UTC

vi.recover in OpenBSD before 3.1 allows local users to remove arbitrary zero-byte files such as device nodes.

CVE-2001-1380 openbsd vulnerability CVSS: 7.5 18 Oct 2001, 04:00 UTC

OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.

CVE-2001-0670 openbsd vulnerability CVSS: 7.5 03 Oct 2001, 04:00 UTC

Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.

CVE-2001-1382 openbsd vulnerability CVSS: 5.0 27 Sep 2001, 04:00 UTC

The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.

CVE-2001-1029 openbsd vulnerability CVSS: 2.1 20 Sep 2001, 04:00 UTC

libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.

CVE-2001-0572 openbsd vulnerability CVSS: 7.5 22 Aug 2001, 04:00 UTC

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.

CVE-2001-1145 openbsd vulnerability CVSS: 6.2 17 Aug 2001, 04:00 UTC

fts routines in FreeBSD 4.3 and earlier, NetBSD before 1.5.2, and OpenBSD 2.9 and earlier can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform dangerous actions on the wrong directories.

CVE-2001-0554 openbsd vulnerability CVSS: 10.0 14 Aug 2001, 04:00 UTC

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

CVE-2001-0529 openbsd vulnerability CVSS: 7.2 14 Aug 2001, 04:00 UTC

OpenSSH version 2.9 and earlier, with X forwarding enabled, allows a local attacker to delete any file named 'cookies' via a symlink attack.

CVE-2001-1244 openbsd vulnerability CVSS: 5.0 07 Jul 2001, 04:00 UTC

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.

CVE-2001-0361 openbsd vulnerability CVSS: 4.0 27 Jun 2001, 04:00 UTC

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.

CVE-2001-0378 openbsd vulnerability CVSS: 2.1 27 Jun 2001, 04:00 UTC

readline prior to 4.1, in OpenBSD 2.8 and earlier, creates history files with insecure permissions, which allows a local attacker to recover potentially sensitive information via readline history files.

CVE-2001-1459 openbsd vulnerability CVSS: 7.5 19 Jun 2001, 04:00 UTC

OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.

CVE-2001-0247 openbsd vulnerability CVSS: 10.0 18 Jun 2001, 04:00 UTC

Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.

CVE-2001-0402 openbsd vulnerability CVSS: 7.5 18 Jun 2001, 04:00 UTC

IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.

CVE-2001-1047 openbsd vulnerability CVSS: 1.2 02 Jun 2001, 04:00 UTC

Race condition in OpenBSD VFS allows local users to cause a denial of service (kernel panic) by (1) creating a pipe in one thread and causing another thread to set one of the file descriptors to NULL via a close, or (2) calling dup2 on a file descriptor in one process, then setting the descriptor to NULL via a close in another process that is created via rfork.

CVE-2001-0284 openbsd vulnerability CVSS: 10.0 03 May 2001, 04:00 UTC

Buffer overflow in IPSEC authentication mechanism for OpenBSD 2.8 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a malformed Authentication header (AH) IPv4 option.

CVE-2001-0268 openbsd vulnerability CVSS: 7.2 03 May 2001, 04:00 UTC

The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.

CVE-2001-0144 openbsd vulnerability CVSS: 10.0 12 Mar 2001, 05:00 UTC

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.

CVE-2000-0312 openbsd vulnerability CVSS: 7.2 12 Mar 2001, 05:00 UTC

cron in OpenBSD 2.5 allows local users to gain root privileges via an argv[] that is not NULL terminated, which is passed to cron's fake popen function.

CVE-2000-0310 openbsd vulnerability CVSS: 5.0 12 Mar 2001, 05:00 UTC

IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets.

CVE-2000-0313 openbsd vulnerability CVSS: 4.6 12 Mar 2001, 05:00 UTC

Vulnerability in OpenBSD 2.6 allows a local user to change interface media configurations.

CVE-2000-0309 openbsd vulnerability CVSS: 2.1 12 Mar 2001, 05:00 UTC

The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service.

CVE-2001-0053 openbsd vulnerability CVSS: 10.0 12 Feb 2001, 05:00 UTC

One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges.

CVE-2000-1169 openbsd vulnerability CVSS: 7.5 09 Jan 2001, 05:00 UTC

OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.

CVE-2000-0993 openbsd vulnerability CVSS: 7.2 19 Dec 2000, 05:00 UTC

Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd.

CVE-2000-0994 openbsd vulnerability CVSS: 7.2 19 Dec 2000, 05:00 UTC

Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable.

CVE-2000-0995 openbsd vulnerability CVSS: 7.2 19 Dec 2000, 05:00 UTC

Format string vulnerability in OpenBSD yp_passwd program (and possibly other BSD-based operating systems) allows attackers to gain root privileges a malformed name.

CVE-2000-0996 openbsd vulnerability CVSS: 7.2 19 Dec 2000, 05:00 UTC

Format string vulnerability in OpenBSD su program (and possibly other BSD-based operating systems) allows local attackers to gain root privileges via a malformed shell.

CVE-2000-0997 openbsd vulnerability CVSS: 7.2 19 Dec 2000, 05:00 UTC

Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local attackers to gain root privileges.

CVE-2000-0914 openbsd vulnerability CVSS: 5.0 19 Dec 2000, 05:00 UTC

OpenBSD 2.6 and earlier allows remote attackers to cause a denial of service by flooding the server with ARP requests.

CVE-2000-0962 openbsd vulnerability CVSS: 5.0 19 Dec 2000, 05:00 UTC

The IPSEC implementation in OpenBSD 2.7 does not properly handle empty AH/ESP packets, which allows remote attackers to cause a denial of service.

CVE-2000-0992 openbsd vulnerability CVSS: 5.0 19 Dec 2000, 05:00 UTC

Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.

CVE-2000-0999 openbsd vulnerability CVSS: 10.0 11 Dec 2000, 05:00 UTC

Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow attackers to gain root privileges.

CVE-2000-1010 openbsd vulnerability CVSS: 10.0 11 Dec 2000, 05:00 UTC

Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters.

CVE-2000-1004 openbsd vulnerability CVSS: 4.6 11 Dec 2000, 05:00 UTC

Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters.

CVE-2000-0750 openbsd vulnerability CVSS: 7.5 20 Oct 2000, 04:00 UTC

Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name.

CVE-2000-0751 openbsd vulnerability CVSS: 7.5 20 Oct 2000, 04:00 UTC

mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.

CVE-2000-0574 openbsd vulnerability CVSS: 5.0 07 Jul 2000, 04:00 UTC

FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.

CVE-2000-0525 openbsd vulnerability CVSS: 10.0 08 Jun 2000, 04:00 UTC

OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.

CVE-2000-0217 openbsd vulnerability CVSS: 5.1 24 Feb 2000, 05:00 UTC

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.

CVE-2000-0143 openbsd vulnerability CVSS: 4.6 11 Feb 2000, 05:00 UTC

The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.

CVE-2000-0092 openbsd vulnerability CVSS: 6.2 19 Jan 2000, 05:00 UTC

The BSD make program allows local users to modify files via a symlink attack when the -j option is being used.

CVE-1999-0001 openbsd vulnerability CVSS: 5.0 30 Dec 1999, 05:00 UTC

ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.

CVE-1999-1010 openbsd vulnerability CVSS: 2.1 14 Dec 1999, 05:00 UTC

An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.

CVE-2000-0489 openbsd vulnerability CVSS: 2.1 05 Sep 1999, 04:00 UTC

FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.

CVE-1999-0724 openbsd vulnerability CVSS: 4.6 12 Aug 1999, 04:00 UTC

Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function.

CVE-1999-0674 openbsd vulnerability CVSS: 7.2 09 Aug 1999, 04:00 UTC

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.

CVE-1999-0727 openbsd vulnerability CVSS: 5.0 06 Aug 1999, 04:00 UTC

A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted.

CVE-1999-0703 openbsd vulnerability CVSS: 3.6 03 Aug 1999, 04:00 UTC

OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.

CVE-1999-0481 openbsd vulnerability CVSS: 5.0 22 Mar 1999, 05:00 UTC

Denial of service in "poll" in OpenBSD.

CVE-1999-0482 openbsd vulnerability CVSS: 5.0 21 Mar 1999, 05:00 UTC

OpenBSD kernel crash through TSS handling, as caused by the crashme program.

CVE-1999-0483 openbsd vulnerability CVSS: 2.1 25 Feb 1999, 05:00 UTC

OpenBSD crash using nlink value in FFS and EXT2FS filesystems.

CVE-1999-0484 openbsd vulnerability CVSS: 2.1 23 Feb 1999, 05:00 UTC

Buffer overflow in OpenBSD ping.

CVE-1999-0485 openbsd vulnerability CVSS: 2.6 19 Feb 1999, 05:00 UTC

Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.

CVE-1999-0396 openbsd vulnerability CVSS: 2.6 17 Feb 1999, 05:00 UTC

A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.

CVE-1999-0798 openbsd vulnerability CVSS: 10.0 04 Dec 1998, 05:00 UTC

Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.

CVE-1999-0052 openbsd vulnerability CVSS: 5.0 04 Nov 1998, 05:00 UTC

IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.

CVE-1999-0062 openbsd vulnerability CVSS: 7.2 03 Aug 1998, 04:00 UTC

The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage.

CVE-1999-0303 openbsd vulnerability CVSS: 4.6 21 May 1998, 04:00 UTC

Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.

CVE-1999-0323 openbsd vulnerability CVSS: 10.0 20 Feb 1998, 05:00 UTC

FreeBSD mmap function allows users to modify append-only or immutable files.

CVE-1999-0304 openbsd vulnerability CVSS: 7.2 01 Feb 1998, 05:00 UTC

mmap function in BSD allows local attackers in the kmem group to modify memory through devices.

CVE-1999-0305 openbsd vulnerability CVSS: 5.0 01 Feb 1998, 05:00 UTC

The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.

CVE-1999-0061 openbsd vulnerability CVSS: 5.1 02 Oct 1997, 04:00 UTC

File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).

CVE-1999-1214 openbsd vulnerability CVSS: 2.1 15 Sep 1997, 04:00 UTC

The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID.

CVE-1999-1225 openbsd vulnerability CVSS: 5.0 24 Aug 1997, 04:00 UTC

rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.