Search CVE reports


Toggle filters

441 – 450 of 470 results


CVE-2006-4925

Medium priority
Fixed

packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4343

Medium priority
Fixed

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a...

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-3738

Medium priority
Fixed

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-2940

Medium priority
Fixed

OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in...

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-2937

Medium priority
Fixed

OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-5052

Medium priority
Fixed

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-5051

Medium priority
Fixed

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4924

Medium priority
Fixed

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4339

Medium priority
Fixed

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is...

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-0883

Medium priority
Not affected

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages