Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2005-2798

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-06 Sep, 2005 | 04:00
Updated At-07 Aug, 2024 | 22:45
Rejected At-
Credits

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:06 Sep, 2005 | 04:00
Updated At:07 Aug, 2024 | 22:45
Rejected At:
▼CVE Numbering Authority (CNA)

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.redhat.com/support/errata/RHSA-2005-527.html
vendor-advisory
x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
vdb-entry
x_refsource_XF
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
vendor-advisory
x_refsource_SCO
http://secunia.com/advisories/18507
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/421411/100/0/threaded
vendor-advisory
x_refsource_HP
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
vendor-advisory
x_refsource_SUSE
http://www.osvdb.org/19141
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/archive/1/421411/100/0/threaded
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/18406
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/14729
vdb-entry
x_refsource_BID
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/18717
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/17077
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/0144
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
vdb-entry
signature
x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
vdb-entry
signature
x_refsource_OVAL
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
x_refsource_CONFIRM
http://secunia.com/advisories/17245
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18661
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18010
third-party-advisory
x_refsource_SECUNIA
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
mailing-list
x_refsource_MLIST
http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
vendor-advisory
x_refsource_MANDRIVA
http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
x_refsource_CONFIRM
http://securitytracker.com/id?1014845
vdb-entry
x_refsource_SECTRACK
https://usn.ubuntu.com/209-1/
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/16686
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-527.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
Resource:
vdb-entry
x_refsource_XF
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
Resource:
vendor-advisory
x_refsource_SCO
Hyperlink: http://secunia.com/advisories/18507
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.osvdb.org/19141
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/18406
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/14729
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/18717
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/17077
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/0144
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/17245
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18661
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18010
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://securitytracker.com/id?1014845
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://usn.ubuntu.com/209-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/16686
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.redhat.com/support/errata/RHSA-2005-527.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
vdb-entry
x_refsource_XF
x_transferred
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
vendor-advisory
x_refsource_SCO
x_transferred
http://secunia.com/advisories/18507
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/421411/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.osvdb.org/19141
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/archive/1/421411/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/18406
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/14729
vdb-entry
x_refsource_BID
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/18717
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/17077
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/0144
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
vdb-entry
signature
x_refsource_OVAL
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/17245
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18661
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18010
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
x_refsource_CONFIRM
x_transferred
http://securitytracker.com/id?1014845
vdb-entry
x_refsource_SECTRACK
x_transferred
https://usn.ubuntu.com/209-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/16686
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-527.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
Resource:
vendor-advisory
x_refsource_SCO
x_transferred
Hyperlink: http://secunia.com/advisories/18507
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.osvdb.org/19141
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/18406
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/14729
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/18717
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/17077
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/0144
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/17245
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18661
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18010
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://securitytracker.com/id?1014845
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://usn.ubuntu.com/209-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/16686
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:06 Sep, 2005 | 17:03
Updated At:03 Apr, 2025 | 01:03

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

OpenBSD
openbsd
>>openssh>>3.0
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1p1
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2p1
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0p1
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1p1
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.2p1
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.3p1
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3p1
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4p1
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5p1
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p1
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p2
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1p2
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1p1
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1p1
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.0p1
cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.1p1
cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2006-11-20T00:00:00

This issue does not affect Red Hat Enterprise Linux 2.1 and 3. This flaw was fixed in Red Hat Enterprise Linux 4 via errata RHSA-2005:527: http://rhn.redhat.com/errata/RHSA-2005-527.html

References
HyperlinkSourceResource
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txtsecalert@redhat.com
N/A
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/16686secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/17077secalert@redhat.com
N/A
http://secunia.com/advisories/17245secalert@redhat.com
N/A
http://secunia.com/advisories/18010secalert@redhat.com
N/A
http://secunia.com/advisories/18406secalert@redhat.com
N/A
http://secunia.com/advisories/18507secalert@redhat.com
N/A
http://secunia.com/advisories/18661secalert@redhat.com
N/A
http://secunia.com/advisories/18717secalert@redhat.com
N/A
http://securitytracker.com/id?1014845secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-033.htmsecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2005:172secalert@redhat.com
N/A
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/19141secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2005-527.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/421411/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/421411/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/14729secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/0144secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717secalert@redhat.com
N/A
https://usn.ubuntu.com/209-1/secalert@redhat.com
N/A
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/16686af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://secunia.com/advisories/17077af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/17245af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18010af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18406af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18507af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18661af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18717af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1014845af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-033.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2005:172af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/19141af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2005-527.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/421411/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/421411/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/14729af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/0144af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717af854a3a-2127-422b-91ae-364da2661108
N/A
https://usn.ubuntu.com/209-1/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/16686
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/17077
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/17245
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18010
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18406
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18507
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18661
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18717
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1014845
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/19141
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-527.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/14729
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0144
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://usn.ubuntu.com/209-1/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/16686
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/17077
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/17245
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18010
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18406
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18507
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18661
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18717
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1014845
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/19141
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-527.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/421411/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/14729
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0144
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://usn.ubuntu.com/209-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

14Records found

CVE-1999-0305
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.73% / 71.74%
||
7 Day CHG~0.00%
Published-29 Sep, 1999 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.

Action-Not Available
Vendor-bsdin/aOpenBSDFreeBSD Foundation
Product-bsd_osopenbsdfreebsdn/a
CVE-2011-0539
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.52% / 80.47%
||
7 Day CHG~0.00%
Published-10 Feb, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

Action-Not Available
Vendor-n/aOpenBSD
Product-opensshn/a
CVE-2018-15473
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-92.65% / 99.74%
||
7 Day CHG+0.18%
Published-17 Aug, 2018 | 00:00
Updated-05 Aug, 2024 | 09:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxSiemens AGOpenBSDNetApp, Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxvirtual_storage_consolestorage_replication_adaptercn1610cloud_backupscalance_x204rna_firmwareservice_processorfas_baseboard_management_controlleraff_baseboard_management_controllersteelstore_cloud_integrated_storageclustered_data_ontapsun_zfs_storage_appliance_kitdebian_linuxontap_select_deploydata_ontapenterprise_linux_workstationopensshdata_ontap_edgescalance_x204rnacn1610_firmwarevasa_provideroncommand_unified_managerenterprise_linux_desktopn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-15919
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.72% / 71.52%
||
7 Day CHG~0.00%
Published-28 Aug, 2018 | 08:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'

Action-Not Available
Vendor-n/aOpenBSDNetApp, Inc.
Product-ontap_select_deploycn1610cloud_backupsteelstoreopensshdata_ontap_edgecn1610_firmwaren/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2002-0381
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.78% / 72.80%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.

Action-Not Available
Vendor-n/aOpenBSDNetBSDFreeBSD Foundation
Product-netbsdopenbsdfreebsdn/a
CVE-2002-0514
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.09% / 83.31%
||
7 Day CHG~0.00%
Published-11 Jun, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PF in OpenBSD 3.0 with the return-rst rule sets the TTL to 128 in the RST packet, which allows remote attackers to determine if a port is being filtered because the TTL is different than the default TTL.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2001-1382
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.73% / 71.79%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.

Action-Not Available
Vendor-n/aOpenBSD
Product-opensshn/a
CVE-1999-0727
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.61% / 68.81%
||
7 Day CHG~0.00%
Published-22 Mar, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-1999-1225
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.46% / 62.91%
||
7 Day CHG~0.00%
Published-12 Sep, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.

Action-Not Available
Vendor-digitaln/aNetBSDLinux Kernel Organization, IncOpenBSDSun Microsystems (Oracle Corporation)
Product-linux_kernelnetbsdopenbsdsolarisultrixn/a
CVE-2007-2243
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.48% / 64.12%
||
7 Day CHG~0.00%
Published-25 Apr, 2007 | 16:00
Updated-07 Aug, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.

Action-Not Available
Vendor-n/aOpenBSD
Product-opensshn/a
CWE ID-CWE-287
Improper Authentication
CVE-2006-4436
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.66% / 70.12%
||
7 Day CHG~0.00%
Published-29 Aug, 2006 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

isakmpd in OpenBSD 3.8, 3.9, and possibly earlier versions, creates Security Associations (SA) with a replay window of size 0 when isakmpd acts as a responder during SA negotiation, which allows remote attackers to replay IPSec packets and bypass the replay protection.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2006-5052
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-16.01% / 94.51%
||
7 Day CHG~0.00%
Published-27 Sep, 2006 | 23:00
Updated-07 Aug, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

Action-Not Available
Vendor-n/aOpenBSD
Product-opensshn/a
CVE-2003-0078
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-18.67% / 95.02%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

Action-Not Available
Vendor-n/aOpenBSDOpenSSLFreeBSD Foundation
Product-opensslopenbsdfreebsdn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2003-0190
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-14.69% / 94.22%
||
7 Day CHG~0.00%
Published-02 May, 2003 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.

Action-Not Available
Vendor-openpkgn/aOpenBSDSiemens AG
Product-scalance_x204rna_firmwarescalance_x204rnaopensshscalance_x204rna_eccscalance_x204rna_ecc_firmwareopenpkgn/a
CWE ID-CWE-203
Observable Discrepancy
Details not found