# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-27882 |
681 |
|
Overflow |
2022-03-25 |
2022-05-12 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation. |
2 |
CVE-2022-27881 |
120 |
|
Overflow |
2022-03-25 |
2022-05-12 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation. |
3 |
CVE-2021-41617 |
|
|
|
2021-09-26 |
2022-10-25 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user. |
4 |
CVE-2021-41581 |
125 |
|
|
2021-09-24 |
2021-09-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination. |
5 |
CVE-2021-36368 |
287 |
|
Bypass |
2022-03-13 |
2022-07-01 |
2.6 |
None |
Remote |
High |
Not required |
Partial |
None |
None |
** DISPUTED ** An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed." |
6 |
CVE-2021-28041 |
415 |
|
|
2021-03-05 |
2022-05-20 |
4.6 |
None |
Remote |
High |
??? |
Partial |
Partial |
Partial |
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host. |
7 |
CVE-2020-26142 |
74 |
|
|
2021-05-11 |
2021-12-03 |
2.6 |
None |
Remote |
High |
Not required |
None |
Partial |
None |
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration. |
8 |
CVE-2020-16088 |
287 |
|
Bypass |
2020-07-28 |
2022-01-04 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches. |
9 |
CVE-2020-15778 |
78 |
|
|
2020-07-24 |
2022-12-28 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows." |
10 |
CVE-2020-14145 |
203 |
|
+Info |
2020-06-29 |
2022-04-28 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected. |
11 |
CVE-2020-12062 |
20 |
|
|
2020-06-01 |
2020-06-04 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
** DISPUTED ** The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances." |
12 |
CVE-2020-7247 |
78 |
|
Exec Code |
2020-01-29 |
2022-04-29 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. |
13 |
CVE-2019-19726 |
269 |
|
Exec Code |
2019-12-12 |
2023-01-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root. |
14 |
CVE-2019-19522 |
732 |
|
|
2019-12-05 |
2020-08-24 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root. |
15 |
CVE-2019-19521 |
287 |
|
Bypass |
2019-12-05 |
2019-12-12 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c). |
16 |
CVE-2019-19520 |
863 |
|
+Priv |
2019-12-05 |
2020-08-24 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen. |
17 |
CVE-2019-19519 |
20 |
|
|
2019-12-05 |
2021-07-21 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c. |
18 |
CVE-2019-16905 |
190 |
|
Exec Code Overflow Mem. Corr. |
2019-10-09 |
2022-12-13 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH. |
19 |
CVE-2019-14899 |
300 |
|
|
2019-12-11 |
2023-01-09 |
4.9 |
None |
Local Network |
Medium |
??? |
Partial |
Partial |
Partial |
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel. |
20 |
CVE-2019-8460 |
|
|
DoS |
2019-08-26 |
2021-08-02 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service. |
21 |
CVE-2019-6111 |
22 |
|
Dir. Trav. |
2019-01-31 |
2022-12-13 |
5.8 |
None |
Remote |
Medium |
Not required |
None |
Partial |
Partial |
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). |
22 |
CVE-2019-6110 |
838 |
|
|
2019-01-31 |
2022-12-13 |
4.0 |
None |
Remote |
High |
Not required |
Partial |
Partial |
None |
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred. |
23 |
CVE-2019-6109 |
116 |
|
|
2019-01-31 |
2022-12-13 |
4.0 |
None |
Remote |
High |
Not required |
Partial |
Partial |
None |
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c. |
24 |
CVE-2018-20685 |
863 |
|
Bypass |
2019-01-10 |
2022-12-13 |
2.6 |
None |
Remote |
High |
Not required |
None |
Partial |
None |
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side. |
25 |
CVE-2018-15919 |
200 |
|
+Info |
2018-08-28 |
2019-03-07 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.' |
26 |
CVE-2018-15473 |
362 |
|
|
2018-08-17 |
2022-12-13 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. |
27 |
CVE-2018-14775 |
20 |
|
DoS |
2018-08-01 |
2018-10-03 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture. |
28 |
CVE-2018-12434 |
200 |
|
+Info |
2018-06-15 |
2018-08-06 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. |
29 |
CVE-2018-8970 |
295 |
|
+Info |
2018-03-24 |
2018-04-24 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not. |
30 |
CVE-2017-1000373 |
400 |
|
Exec Code |
2017-06-19 |
2017-10-24 |
6.4 |
None |
Remote |
Low |
Not required |
None |
Partial |
Partial |
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects OpenBSD 6.1 and possibly earlier versions. |
31 |
CVE-2017-1000372 |
|
|
Exec Code Bypass |
2017-06-19 |
2019-10-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A flaw exists in OpenBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions. |
32 |
CVE-2017-15906 |
732 |
|
|
2017-10-26 |
2022-12-13 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files. |
33 |
CVE-2017-8301 |
295 |
|
|
2017-04-27 |
2019-10-03 |
2.6 |
None |
Remote |
High |
Not required |
None |
Partial |
None |
LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx. |
34 |
CVE-2017-5850 |
770 |
|
DoS |
2017-03-27 |
2019-10-03 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header. |
35 |
CVE-2016-20012 |
|
|
|
2021-09-15 |
2022-04-18 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
** DISPUTED ** OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product. |
36 |
CVE-2016-10708 |
476 |
|
DoS |
2018-01-21 |
2021-09-14 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c. |
37 |
CVE-2016-10012 |
119 |
|
Overflow +Priv |
2017-01-05 |
2022-12-13 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures. |
38 |
CVE-2016-10011 |
320 |
|
+Info |
2017-01-05 |
2022-12-13 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. |
39 |
CVE-2016-10010 |
264 |
|
+Priv |
2017-01-05 |
2022-12-13 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c. |
40 |
CVE-2016-10009 |
426 |
|
|
2017-01-05 |
2022-12-13 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket. |
41 |
CVE-2016-8858 |
399 |
|
DoS |
2016-12-09 |
2022-12-13 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue." |
42 |
CVE-2016-6522 |
190 |
|
DoS Overflow |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
Integer overflow in the uvm_map_isavail function in uvm/uvm_map.c in OpenBSD 5.9 allows local users to cause a denial of service (kernel panic) via a crafted mmap call, which triggers the new mapping to overlap with an existing mapping. |
43 |
CVE-2016-6515 |
20 |
|
DoS |
2016-08-07 |
2022-12-13 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string. |
44 |
CVE-2016-6350 |
476 |
|
DoS |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (NULL pointer dereference and panic) via a sysctl call with a path starting with 10,9. |
45 |
CVE-2016-6247 |
20 |
|
DoS |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
OpenBSD 5.8 and 5.9 allows certain local users to cause a denial of service (kernel panic) by unmounting a filesystem with an open vnode on the mnt_vnodelist. |
46 |
CVE-2016-6246 |
20 |
|
DoS |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
OpenBSD 5.8 and 5.9 allows certain local users with kern.usermount privileges to cause a denial of service (kernel panic) by mounting a tmpfs with a VNOVAL in the (1) username, (2) groupname, or (3) device name of the root node. |
47 |
CVE-2016-6245 |
|
|
DoS |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a large size in a getdents system call. |
48 |
CVE-2016-6244 |
20 |
|
DoS |
2017-03-07 |
2017-03-08 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
The sys_thrsigdivert function in kern/kern_sig.c in the OpenBSD kernel 5.9 allows remote attackers to cause a denial of service (panic) via a negative "ts.tv_sec" value. |
49 |
CVE-2016-6243 |
20 |
|
DoS |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
thrsleep in kern/kern_synch.c in OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a crafted value in the tsp parameter of the __thrsleep system call. |
50 |
CVE-2016-6242 |
189 |
|
DoS |
2017-03-07 |
2017-03-09 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (assertion failure and kernel panic) via a large ident value in a kevent system call. |