Advertisement
Guest User

Vulns Teleton honduras

a guest
Dec 8th, 2016
197
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.14 KB | None | 0 0
  1. Starting Nmap 7.31 ( https://nmap.org ) at 2016-12-08 14:41 Hora estándar de Centroamérica
  2.  
  3. Nmap scan report for teleton.org.hn (64.207.185.219)
  4.  
  5. Host is up (0.11s latency).
  6.  
  7. rDNS record for 64.207.185.219: latininteractive.digital
  8.  
  9. PORT STATE SERVICE VERSION
  10.  
  11. 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
  12.  
  13. | vulscan: scip VulDB - http://www.scip.ch/en/?vuldb:
  14.  
  15. | [4584] OpenSSH up to 5.7 auth-options.c information disclosure
  16.  
  17. | [4282] OpenSSH 5.x Legacy Certificate Handler buffer overflow
  18.  
  19. |
  20.  
  21. | MITRE CVE - http://cve.mitre.org:
  22.  
  23. | [CVE-2006-0883] OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
  24.  
  25. | [CVE-2012-0814] The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
  26.  
  27. | [CVE-2011-5000] The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
  28.  
  29. | [CVE-2011-0539] The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
  30.  
  31. | [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
  32.  
  33. | [CVE-2010-4478] OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
  34.  
  35. | [CVE-2009-2904] A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
  36.  
  37. | [CVE-2008-3844] Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
  38.  
  39. | [CVE-2008-3259] OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
  40.  
  41. |
  42.  
  43. | OSVDB - http://www.osvdb.org:
  44.  
  45. | [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
  46.  
  47. | [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
  48.  
  49. | [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
  50.  
  51. | [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
  52.  
  53. | [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
  54.  
  55. | [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
  56.  
  57. | [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
  58.  
  59. | [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
  60.  
  61. | [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
  62.  
  63. | [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
  64.  
  65. | [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
  66.  
  67. | [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
  68.  
  69. | [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
  70.  
  71. | [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
  72.  
  73. | [56921] OpenSSH Unspecified Remote Compromise
  74.  
  75. | [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
  76.  
  77. | [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
  78.  
  79. | [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
  80.  
  81. | [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
  82.  
  83. | [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
  84.  
  85. | [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
  86.  
  87. | [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
  88.  
  89. | [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
  90.  
  91. | [43745] OpenSSH X11 Forwarding Local Session Hijacking
  92.  
  93. | [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
  94.  
  95. | [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
  96.  
  97. | [37315] pam_usb OpenSSH Authentication Unspecified Issue
  98.  
  99. | [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
  100.  
  101. | [34601] OPIE w/ OpenSSH Account Enumeration
  102.  
  103. | [34600] OpenSSH S/KEY Authentication Account Enumeration
  104.  
  105. | [32721] OpenSSH Username Password Complexity Account Enumeration
  106.  
  107. | [30232] OpenSSH Privilege Separation Monitor Weakness
  108.  
  109. | [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
  110.  
  111. | [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
  112.  
  113. | [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
  114.  
  115. | [29152] OpenSSH Identical Block Packet DoS
  116.  
  117. | [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
  118.  
  119. | [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
  120.  
  121. | [22692] OpenSSH scp Command Line Filename Processing Command Injection
  122.  
  123. | [20216] OpenSSH with KerberosV Remote Authentication Bypass
  124.  
  125. | [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
  126.  
  127. | [19141] OpenSSH GSSAPIAuthentication Credential Escalation
  128.  
  129. | [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
  130.  
  131. | [16567] OpenSSH Privilege Separation LoginGraceTime DoS
  132.  
  133. | [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
  134.  
  135. | [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
  136.  
  137. | [9550] OpenSSH scp Traversal Arbitrary File Overwrite
  138.  
  139. | [6601] OpenSSH *realloc() Unspecified Memory Errors
  140.  
  141. | [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
  142.  
  143. | [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
  144.  
  145. | [6072] OpenSSH PAM Conversation Function Stack Modification
  146.  
  147. | [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
  148.  
  149. | [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
  150.  
  151. | [5408] OpenSSH echo simulation Information Disclosure
  152.  
  153. | [5113] OpenSSH NIS YP Netgroups Authentication Bypass
  154.  
  155. | [4536] OpenSSH Portable AIX linker Privilege Escalation
  156.  
  157. | [3938] OpenSSL and OpenSSH /dev/random Check Failure
  158.  
  159. | [3456] OpenSSH buffer_append_space() Heap Corruption
  160.  
  161. | [2557] OpenSSH Multiple Buffer Management Multiple Overflows
  162.  
  163. | [2140] OpenSSH w/ PAM Username Validity Timing Attack
  164.  
  165. | [2112] OpenSSH Reverse DNS Lookup Bypass
  166.  
  167. | [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
  168.  
  169. | [1853] OpenSSH Symbolic Link 'cookies' File Removal
  170.  
  171. | [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
  172.  
  173. | [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
  174.  
  175. | [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
  176.  
  177. | [688] OpenSSH UseLogin Environment Variable Local Command Execution
  178.  
  179. | [642] OpenSSH Multiple Key Type ACL Bypass
  180.  
  181. | [504] OpenSSH SSHv2 Public Key Authentication Bypass
  182.  
  183. | [341] OpenSSH UseLogin Local Privilege Escalation
  184.  
  185. |
  186.  
  187. | SecurityFocus - http://www.securityfocus.com/bid/:
  188.  
  189. | [61286] OpenSSH Remote Denial of Service Vulnerability
  190.  
  191. | [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
  192.  
  193. | [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
  194.  
  195. | [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
  196.  
  197. | [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
  198.  
  199. | [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
  200.  
  201. | [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
  202.  
  203. | [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
  204.  
  205. | [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
  206.  
  207. | [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
  208.  
  209. | [45304] OpenSSH J-PAKE Security Bypass Vulnerability
  210.  
  211. | [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
  212.  
  213. | [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
  214.  
  215. | [30794] Red Hat OpenSSH Backdoor Vulnerability
  216.  
  217. | [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
  218.  
  219. | [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
  220.  
  221. | [28531] OpenSSH ForceCommand Command Execution Weakness
  222.  
  223. | [28444] OpenSSH X Connections Session Hijacking Vulnerability
  224.  
  225. | [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
  226.  
  227. | [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
  228.  
  229. | [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
  230.  
  231. | [20956] OpenSSH Privilege Separation Key Signature Weakness
  232.  
  233. | [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
  234.  
  235. | [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
  236.  
  237. | [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
  238.  
  239. | [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
  240.  
  241. | [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
  242.  
  243. | [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
  244.  
  245. | [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
  246.  
  247. | [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
  248.  
  249. | [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
  250.  
  251. | [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
  252.  
  253. | [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
  254.  
  255. | [8677] Multiple Portable OpenSSH PAM Vulnerabilities
  256.  
  257. | [8628] OpenSSH Buffer Mismanagement Vulnerabilities
  258.  
  259. | [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
  260.  
  261. | [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
  262.  
  263. | [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
  264.  
  265. | [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
  266.  
  267. | [6168] OpenSSH Visible Password Vulnerability
  268.  
  269. | [5374] OpenSSH Trojan Horse Vulnerability
  270.  
  271. | [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
  272.  
  273. | [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
  274.  
  275. | [4241] OpenSSH Channel Code Off-By-One Vulnerability
  276.  
  277. | [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
  278.  
  279. | [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
  280.  
  281. | [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
  282.  
  283. | [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
  284.  
  285. | [2917] OpenSSH PAM Session Evasion Vulnerability
  286.  
  287. | [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
  288.  
  289. | [2356] OpenSSH Private Key Authentication Check Vulnerability
  290.  
  291. | [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
  292.  
  293. | [1334] OpenSSH UseLogin Vulnerability
  294.  
  295. |
  296.  
  297. | SecurityTracker - http://www.securitytracker.com:
  298.  
  299. | [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
  300.  
  301. | [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
  302.  
  303. | [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
  304.  
  305. | [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
  306.  
  307. | [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
  308.  
  309. | [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
  310.  
  311. | [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
  312.  
  313. | [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
  314.  
  315. | [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
  316.  
  317. | [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
  318.  
  319. | [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
  320.  
  321. | [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
  322.  
  323. | [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
  324.  
  325. | [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
  326.  
  327. | [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
  328.  
  329. | [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
  330.  
  331. | [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
  332.  
  333. | [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
  334.  
  335. | [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
  336.  
  337. | [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
  338.  
  339. | [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
  340.  
  341. | [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
  342.  
  343. | [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
  344.  
  345. | [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
  346.  
  347. | [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
  348.  
  349. | [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
  350.  
  351. | [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
  352.  
  353. | [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
  354.  
  355. | [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
  356.  
  357. | [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
  358.  
  359. | [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
  360.  
  361. | [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
  362.  
  363. | [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
  364.  
  365. | [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
  366.  
  367. | [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
  368.  
  369. | [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
  370.  
  371. | [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
  372.  
  373. | [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
  374.  
  375. |
  376.  
  377. | IBM X-Force - http://xforce.iss.net:
  378.  
  379. | [83258] GSI-OpenSSH auth-pam.c security bypass
  380.  
  381. | [82781] OpenSSH time limit denial of service
  382.  
  383. | [82231] OpenSSH pam_ssh_agent_auth PAM code execution
  384.  
  385. | [74809] OpenSSH ssh_gssapi_parse_ename denial of service
  386.  
  387. | [72756] Debian openssh-server commands information disclosure
  388.  
  389. | [68339] OpenSSH pam_thread buffer overflow
  390.  
  391. | [67264] OpenSSH ssh-keysign unauthorized access
  392.  
  393. | [65910] OpenSSH remote_glob function denial of service
  394.  
  395. | [65163] OpenSSH certificate information disclosure
  396.  
  397. | [64387] OpenSSH J-PAKE security bypass
  398.  
  399. | [63337] Cisco Unified Videoconferencing OpenSSH weak security
  400.  
  401. | [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
  402.  
  403. | [45202] OpenSSH signal handler denial of service
  404.  
  405. | [44747] RHEL OpenSSH backdoor
  406.  
  407. | [44280] OpenSSH PermitRootLogin information disclosure
  408.  
  409. | [44279] OpenSSH sshd weak security
  410.  
  411. | [44037] OpenSSH sshd SELinux role unauthorized access
  412.  
  413. | [43940] OpenSSH X11 forwarding information disclosure
  414.  
  415. | [41549] OpenSSH ForceCommand directive security bypass
  416.  
  417. | [41438] OpenSSH sshd session hijacking
  418.  
  419. | [40897] OpenSSH known_hosts weak security
  420.  
  421. | [40587] OpenSSH username weak security
  422.  
  423. | [37371] OpenSSH username data manipulation
  424.  
  425. | [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
  426.  
  427. | [37112] RHSA update for OpenSSH signal handler race condition not installed
  428.  
  429. | [37107] RHSA update for OpenSSH identical block denial of service not installed
  430.  
  431. | [36637] OpenSSH X11 cookie privilege escalation
  432.  
  433. | [35167] OpenSSH packet.c newkeys[mode] denial of service
  434.  
  435. | [34490] OpenSSH OPIE information disclosure
  436.  
  437. | [33794] OpenSSH ChallengeResponseAuthentication information disclosure
  438.  
  439. | [32975] Apple Mac OS X OpenSSH denial of service
  440.  
  441. | [32387] RHSA-2006:0738 updates for openssh not installed
  442.  
  443. | [32359] RHSA-2006:0697 updates for openssh not installed
  444.  
  445. | [32230] RHSA-2006:0298 updates for openssh not installed
  446.  
  447. | [32132] RHSA-2006:0044 updates for openssh not installed
  448.  
  449. | [30120] OpenSSH privilege separation monitor authentication verification weakness
  450.  
  451. | [29255] OpenSSH GSSAPI user enumeration
  452.  
  453. | [29254] OpenSSH signal handler race condition
  454.  
  455. | [29158] OpenSSH identical block denial of service
  456.  
  457. | [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
  458.  
  459. | [25116] OpenSSH OpenPAM denial of service
  460.  
  461. | [24305] OpenSSH SCP shell expansion command execution
  462.  
  463. | [22665] RHSA-2005:106 updates for openssh not installed
  464.  
  465. | [22117] OpenSSH GSSAPI allows elevated privileges
  466.  
  467. | [22115] OpenSSH GatewayPorts security bypass
  468.  
  469. | [20930] OpenSSH sshd.c LoginGraceTime denial of service
  470.  
  471. | [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
  472.  
  473. | [17213] OpenSSH allows port bouncing attacks
  474.  
  475. | [16323] OpenSSH scp file overwrite
  476.  
  477. | [13797] OpenSSH PAM information leak
  478.  
  479. | [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
  480.  
  481. | [13264] OpenSSH PAM code could allow an attacker to gain access
  482.  
  483. | [13215] OpenSSH buffer management errors could allow an attacker to execute code
  484.  
  485. | [13214] OpenSSH memory vulnerabilities
  486.  
  487. | [13191] OpenSSH large packet buffer overflow
  488.  
  489. | [12196] OpenSSH could allow an attacker to bypass login restrictions
  490.  
  491. | [11970] OpenSSH could allow an attacker to obtain valid administrative account
  492.  
  493. | [11902] OpenSSH PAM support enabled information leak
  494.  
  495. | [9803] OpenSSH &quot
  496.  
  497. | [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
  498.  
  499. | [9307] OpenSSH is running on the system
  500.  
  501. | [9169] OpenSSH &quot
  502.  
  503. | [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
  504.  
  505. | [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
  506.  
  507. | [8383] OpenSSH off-by-one error in channel code
  508.  
  509. | [7647] OpenSSH UseLogin option arbitrary code execution
  510.  
  511. | [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
  512.  
  513. | [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
  514.  
  515. | [7179] OpenSSH source IP access control bypass
  516.  
  517. | [6757] OpenSSH &quot
  518.  
  519. | [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
  520.  
  521. | [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
  522.  
  523. | [5517] OpenSSH allows unauthorized access to resources
  524.  
  525. | [4646] OpenSSH UseLogin option allows remote users to execute commands as root
  526.  
  527. |
  528.  
  529. | Exploit-DB - http://www.exploit-db.com:
  530.  
  531. | [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
  532.  
  533. | [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
  534.  
  535. | [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
  536.  
  537. | [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
  538.  
  539. | [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
  540.  
  541. | [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
  542.  
  543. | [17462] OpenSSH 3.5p1 Remote Root Exploit for FreeBSD
  544.  
  545. | [14866] Novell Netware v6.5 OpenSSH Remote Stack Overflow
  546.  
  547. | [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
  548.  
  549. | [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
  550.  
  551. | [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
  552.  
  553. | [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc >= 2.1.9x
  554.  
  555. | [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
  556.  
  557. | [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
  558.  
  559. |
  560.  
  561. | OpenVAS (Nessus) - http://www.openvas.org:
  562.  
  563. | [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
  564.  
  565. | [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
  566.  
  567. | [881183] CentOS Update for openssh CESA-2012:0884 centos6
  568.  
  569. | [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
  570.  
  571. | [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
  572.  
  573. | [870763] RedHat Update for openssh RHSA-2012:0884-04
  574.  
  575. | [870129] RedHat Update for openssh RHSA-2008:0855-01
  576.  
  577. | [861813] Fedora Update for openssh FEDORA-2010-5429
  578.  
  579. | [861319] Fedora Update for openssh FEDORA-2007-395
  580.  
  581. | [861170] Fedora Update for openssh FEDORA-2007-394
  582.  
  583. | [861012] Fedora Update for openssh FEDORA-2007-715
  584.  
  585. | [840345] Ubuntu Update for openssh vulnerability USN-597-1
  586.  
  587. | [840300] Ubuntu Update for openssh update USN-612-5
  588.  
  589. | [840271] Ubuntu Update for openssh vulnerability USN-612-2
  590.  
  591. | [840268] Ubuntu Update for openssh update USN-612-7
  592.  
  593. | [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
  594.  
  595. | [840214] Ubuntu Update for openssh vulnerability USN-566-1
  596.  
  597. | [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
  598.  
  599. | [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
  600.  
  601. | [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
  602.  
  603. | [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
  604.  
  605. | [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
  606.  
  607. | [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
  608.  
  609. | [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
  610.  
  611. | [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
  612.  
  613. | [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
  614.  
  615. | [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
  616.  
  617. | [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
  618.  
  619. | [100584] OpenSSH X Connections Session Hijacking Vulnerability
  620.  
  621. | [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
  622.  
  623. | [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
  624.  
  625. | [65987] SLES10: Security update for OpenSSH
  626.  
  627. | [65819] SLES10: Security update for OpenSSH
  628.  
  629. | [65514] SLES9: Security update for OpenSSH
  630.  
  631. | [65513] SLES9: Security update for OpenSSH
  632.  
  633. | [65334] SLES9: Security update for OpenSSH
  634.  
  635. | [65248] SLES9: Security update for OpenSSH
  636.  
  637. | [65218] SLES9: Security update for OpenSSH
  638.  
  639. | [65169] SLES9: Security update for openssh,openssh-askpass
  640.  
  641. | [65126] SLES9: Security update for OpenSSH
  642.  
  643. | [65019] SLES9: Security update for OpenSSH
  644.  
  645. | [65015] SLES9: Security update for OpenSSH
  646.  
  647. | [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
  648.  
  649. | [61639] Debian Security Advisory DSA 1638-1 (openssh)
  650.  
  651. | [61030] Debian Security Advisory DSA 1576-2 (openssh)
  652.  
  653. | [61029] Debian Security Advisory DSA 1576-1 (openssh)
  654.  
  655. | [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
  656.  
  657. | [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
  658.  
  659. | [60667] Slackware Advisory SSA:2008-095-01 openssh
  660.  
  661. | [59014] Slackware Advisory SSA:2007-255-01 openssh
  662.  
  663. | [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
  664.  
  665. | [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
  666.  
  667. | [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
  668.  
  669. | [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
  670.  
  671. | [57492] Slackware Advisory SSA:2006-272-02 openssh
  672.  
  673. | [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
  674.  
  675. | [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
  676.  
  677. | [57470] FreeBSD Ports: openssh
  678.  
  679. | [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
  680.  
  681. | [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
  682.  
  683. | [56294] Slackware Advisory SSA:2006-045-06 openssh
  684.  
  685. | [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
  686.  
  687. | [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
  688.  
  689. | [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
  690.  
  691. | [53788] Debian Security Advisory DSA 025-1 (openssh)
  692.  
  693. | [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
  694.  
  695. | [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
  696.  
  697. | [11343] OpenSSH Client Unauthorized Remote Forwarding
  698.  
  699. | [10954] OpenSSH AFS/Kerberos ticket/token passing
  700.  
  701. | [10883] OpenSSH Channel Code Off by 1
  702.  
  703. | [10823] OpenSSH UseLogin Environment Variables
  704.  
  705. |_
  706.  
  707.  
  708.  
  709. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  710.  
  711. Nmap done: 1 IP address (1 host up) scanned in 44.65 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement