The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of OpenSSH

OpenSSH: privilege escalation via LogVerbose Low-privilege Sandboxed Escape
An attacker can bypass restrictions via LogVerbose Low-privilege Sandboxed Escape of OpenSSH, in order to escalate his privileges...
CERTFR-2021-AVI-281, VIGILANCE-VUL-35105
OpenSSH: use after free via ssh-agent
An attacker can force the usage of a freed memory area via ssh-agent of OpenSSH, in order to trigger a denial of service, and possibly to run code...
CVE-2021-28041, USN-4762-1, VIGILANCE-VUL-34734
OpenSSH: code execution via scp Backticks
An attacker can use a vulnerability via scp Backticks of OpenSSH, in order to run code...
CVE-2020-15778, K04305530, VIGILANCE-VUL-32917
OpenSSH: information disclosure via Dynamic Policy Host Key
An attacker can bypass access restrictions to data via Dynamic Policy Host Key of OpenSSH, in order to obtain sensitive information...
CERTFR-2020-AVI-639, CVE-2020-14145, FSA-2020-2, K48050136, openSUSE-SU-2020:2240-1, openSUSE-SU-2020:2298-1, SUSE-SU-2020:3736-1, SUSE-SU-2020:3844-1, SUSE-SU-2020:3866-1, SUSE-SU-2020:3882-1, SUSE-SU-2021:0022-1, VIGILANCE-VUL-32646
OpenSSH: privilege escalation via Scp Desynchronised When Utimes Fails
An attacker can bypass restrictions via Scp Desynchronised When Utimes Fails of OpenSSH, in order to escalate his privileges...
VIGILANCE-VUL-32462
OpenSSH: integer overflow via Experimental XMSS Key Type
An attacker can trigger an integer overflow via Experimental XMSS Key Type of OpenSSH, in order to trigger a denial of service, and possibly to run code...
CERTFR-2019-AVI-491, CVE-2019-16905, VIGILANCE-VUL-30555
OpenSSH scp, PuTTY PSCP: spoofing via Scp Client ANSI Codes stderr File Hidding
An attacker can spoof displayed filenames on the scp client of OpenSSH and PuTTY, in order to deceive the victim...
bulletinjan2019, CVE-2019-6110, ibm10731015, K11315080, K21350967, K42531048, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:13931-1, VIGILANCE-VUL-28262
OpenSSH scp, PuTTY PSCP: spoofing via Scp Client ANSI Codes File Hidding
An attacker can spoof displayed filenames on the scp client of OpenSSH and PuTTY, in order to deceive the victim...
bulletinjan2019, CVE-2019-6109, DLA-1728-1, DSA-2019-117, DSA-4387-1, DSA-4387-2, FEDORA-2019-0f4190cdb0, ibm10731015, K12252011, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, openSUSE-SU-2019:0307-1, openSUSE-SU-2019:1602-1, PAN-100415, PAN-100734, PAN-100855, PAN-102682, PAN-102688, PAN-108992, PAN-117955, PAN-118226, PAN-118957, PAN-119810, PAN-120397, PAN-121058, PAN-123391, PAN-123661, PAN-124039, PAN-125122, PAN-126362, PAN-127118, PAN-128248, PAN-130361, PAN-133527, PAN-82052, PAN-SA-2020-0002, RHSA-2019:3702-01, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:0496-1, SUSE-SU-2019:0941-1, SUSE-SU-2019:13931-1, SUSE-SU-2019:14016-1, SUSE-SU-2019:14030-1, SUSE-SU-2019:1524-1, USN-3885-1, USN-3885-2, VIGILANCE-VUL-28261
OpenSSH, WinSCP: file overwrite via Scp Client Object Name Not Validated
An attacker can send an unexpected object to the scp client of OpeSSH/WinSCP, in order to overwrite files in the current directory of the scp client...
1675, bulletinjan2019, CERTFR-2019-AVI-179, CVE-2018-20684, CVE-2019-6111, DLA-1728-1, DSA-2019-117, DSA-4387-1, DSA-4387-2, FEDORA-2019-0f4190cdb0, FreeBSD-EN-19:10.scp, ibm10731015, K11315080, K21350967, K42531048, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, openSUSE-SU-2019:0307-1, openSUSE-SU-2019:1602-1, PAN-100415, PAN-100734, PAN-100855, PAN-102682, PAN-102688, PAN-108992, PAN-117955, PAN-118226, PAN-118957, PAN-119810, PAN-120397, PAN-121058, PAN-123391, PAN-123661, PAN-124039, PAN-125122, PAN-126362, PAN-127118, PAN-128248, PAN-130361, PAN-133527, PAN-82052, PAN-SA-2020-0002, RHSA-2019:3702-01, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:0496-1, SUSE-SU-2019:0941-1, SUSE-SU-2019:13931-1, SUSE-SU-2019:14016-1, SUSE-SU-2019:14030-1, SUSE-SU-2019:1524-1, USN-3885-1, USN-3885-2, VIGILANCE-VUL-28245
OpenSSH: privilege escalation via Scp Client Empty Dirname Permission Change
An attacker can bypass restrictions via Scp Client Empty Dirname Permission Change of OpenSSH, in order to escalate his privileges...
bulletinjan2019, cpuapr2019, CVE-2018-20685, DLA-1728-1, DSA-4387-1, DSA-4387-2, FEDORA-2019-9eb0ae6296, FEDORA-2019-f6ff819834, ibm10731015, K11315080, K21350967, K42531048, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, PAN-100415, PAN-100734, PAN-100855, PAN-102682, PAN-102688, PAN-108992, PAN-117955, PAN-118226, PAN-118957, PAN-119810, PAN-120397, PAN-121058, PAN-123391, PAN-123661, PAN-124039, PAN-125122, PAN-126362, PAN-127118, PAN-128248, PAN-130361, PAN-133527, PAN-82052, PAN-SA-2020-0002, RHSA-2019:3702-01, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:13931-1, USN-3885-1, USN-3885-2, VIGILANCE-VUL-28244
Our database contains other pages. You can request a free trial to read them.

Display information about OpenSSH: