Openbsd : Security Vulnerabilities, CVEs, Published In 2013
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
Max CVSS
5.0
EPSS Score
7.87%
Published
2013-03-07
Updated
2017-09-19
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
Max CVSS
6.0
EPSS Score
0.42%
Published
2013-11-08
Updated
2019-10-09
2 vulnerabilities found