The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of OpenSSH

OpenSSH: integer overflow via Experimental XMSS Key Type
An attacker can trigger an integer overflow via Experimental XMSS Key Type of OpenSSH, in order to trigger a denial of service, and possibly to run code...
CERTFR-2019-AVI-491, CVE-2019-16905, VIGILANCE-VUL-30555
OpenSSH scp, PuTTY PSCP: spoofing via Scp Client ANSI Codes stderr File Hidding
An attacker can spoof displayed filenames on the scp client of OpenSSH and PuTTY, in order to deceive the victim...
bulletinjan2019, CVE-2019-6110, ibm10731015, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:13931-1, VIGILANCE-VUL-28262
OpenSSH scp, PuTTY PSCP: spoofing via Scp Client ANSI Codes File Hidding
An attacker can spoof displayed filenames on the scp client of OpenSSH and PuTTY, in order to deceive the victim...
bulletinjan2019, CVE-2019-6109, DLA-1728-1, DSA-2019-117, DSA-4387-1, DSA-4387-2, FEDORA-2019-0f4190cdb0, ibm10731015, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, openSUSE-SU-2019:0307-1, openSUSE-SU-2019:1602-1, RHSA-2019:3702-01, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:0496-1, SUSE-SU-2019:0941-1, SUSE-SU-2019:13931-1, SUSE-SU-2019:14016-1, SUSE-SU-2019:14030-1, SUSE-SU-2019:1524-1, USN-3885-1, USN-3885-2, VIGILANCE-VUL-28261
OpenSSH, WinSCP: file overwrite via Scp Client Object Name Not Validated
An attacker can send an unexpected object to the scp client of OpeSSH/WinSCP, in order to overwrite files in the current directory of the scp client...
1675, bulletinjan2019, CERTFR-2019-AVI-179, CVE-2018-20684, CVE-2019-6111, DLA-1728-1, DSA-2019-117, DSA-4387-1, DSA-4387-2, FEDORA-2019-0f4190cdb0, FreeBSD-EN-19:10.scp, ibm10731015, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, openSUSE-SU-2019:0307-1, openSUSE-SU-2019:1602-1, RHSA-2019:3702-01, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:0496-1, SUSE-SU-2019:0941-1, SUSE-SU-2019:13931-1, SUSE-SU-2019:14016-1, SUSE-SU-2019:14030-1, SUSE-SU-2019:1524-1, USN-3885-1, USN-3885-2, VIGILANCE-VUL-28245
OpenSSH: privilege escalation via Scp Client Empty Dirname Permission Change
An attacker can bypass restrictions via Scp Client Empty Dirname Permission Change of OpenSSH, in order to escalate his privileges...
bulletinjan2019, cpuapr2019, CVE-2018-20685, DLA-1728-1, DSA-4387-1, DSA-4387-2, FEDORA-2019-9eb0ae6296, FEDORA-2019-f6ff819834, ibm10731015, openSUSE-SU-2019:0091-1, openSUSE-SU-2019:0093-1, RHSA-2019:3702-01, SUSE-SU-2019:0125-1, SUSE-SU-2019:0126-1, SUSE-SU-2019:0132-1, SUSE-SU-2019:13931-1, USN-3885-1, USN-3885-2, VIGILANCE-VUL-28244
OpenSSH: information disclosure via GSS User Enumeration
An attacker can bypass access restrictions to data via GSS User Enumeration of OpenSSH, in order to obtain sensitive information...
CVE-2018-15919, DSA-2019-131, openSUSE-SU-2018:3801-1, SUSE-SU-2018:3540-1, SUSE-SU-2018:3686-1, SUSE-SU-2018:3768-1, SUSE-SU-2018:3776-1, SUSE-SU-2018:3781-1, VIGILANCE-VUL-27089
OpenSSH: information disclosure via Username Enumeration
An attacker can bypass access restrictions to data via Username Enumeration of OpenSSH, in order to obtain sensitive information...
1170352, bulletinjan2019, CERTFR-2018-AVI-410, CVE-2018-15473, DLA-1474-1, DSA-2019-131, DSA-4280-1, FEDORA-2018-065a7722ee, FEDORA-2018-f56ded11c4, NTAP-20181101-0001, openSUSE-SU-2018:3801-1, openSUSE-SU-2018:3946-1, RHSA-2019:0711-01, RHSA-2019:2143-01, SB10267, SSB-439005, SUSE-SU-2018:3540-1, SUSE-SU-2018:3686-1, SUSE-SU-2018:3768-1, SUSE-SU-2018:3776-1, SUSE-SU-2018:3781-1, SUSE-SU-2018:3910-1, SYMSA1469, USN-3809-1, VIGILANCE-VUL-27016
OpenSSH: NULL pointer dereference via a NEWKEYS message
An attacker can force a NULL pointer to be dereferenced in OpenSSH via an out of order NEWKEYS message, in order to trigger a denial of service...
CVE-2016-10708, DLA-1257-1, DLA-1500-1, DLA-1500-2, K32485746, NTAP-20180423-0003, openSUSE-SU-2018:2128-1, SUSE-SU-2018:1989-1, SUSE-SU-2018:2275-1, SUSE-SU-2018:2530-1, SUSE-SU-2018:2685-1, SUSE-SU-2018:3540-1, SYMSA1469, USN-3809-1, VIGILANCE-VUL-25131
OpenSSH: code execution via internal-sftp/writable-chroot/sshrc
In a specific configuration of OpenSSH (internal-sftp with a writable chroot), a remote attacker can run code via /etc/ssh/sshrc...
VIGILANCE-VUL-25030
OpenSSH: empty file creation via read-only sftp-server
An attacker can use sftp-server of OpenSSH, in order to create an empty file, even if the read-only mode is selected...
bulletinjan2019, CVE-2017-15906, DLA-1500-1, DLA-1500-2, FEDORA-2017-4862a3bfb1, FEDORA-2017-78f0991378, FEDORA-2017-96d1995b70, JSA10880, openSUSE-SU-2017:3243-1, RHSA-2018:0980-01, SUSE-SU-2018:2275-1, SUSE-SU-2018:2685-1, SUSE-SU-2018:3540-1, USN-3538-1, VIGILANCE-VUL-24020
Our database contains other pages. You can request a free trial to read them.

Display information about OpenSSH: