Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-0225

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-25 Jan, 2006 | 11:00
Updated At-07 Aug, 2024 | 16:25
Rejected At-
Credits

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:25 Jan, 2006 | 11:00
Updated At:07 Aug, 2024 | 16:25
Rejected At:
▼CVE Numbering Authority (CNA)

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/16369
vdb-entry
x_refsource_BID
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/25936
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18798
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
x_refsource_CONFIRM
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0298.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/18970
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/21492
third-party-advisory
x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
http://www.trustix.org/errata/2006/0004
vendor-advisory
x_refsource_TRUSTIX
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
x_refsource_CONFIRM
http://secunia.com/advisories/19159
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18650
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18736
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/22692
vdb-entry
x_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/2120
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/18579
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18969
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/20723
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
vdb-entry
x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
vendor-advisory
x_refsource_MANDRIVA
http://securityreason.com/securityalert/462
third-party-advisory
x_refsource_SREASON
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4869
vdb-entry
x_refsource_VUPEN
http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
vendor-advisory
x_refsource_OPENPKG
http://www.securityfocus.com/archive/1/425397/100/0/threaded
vendor-advisory
x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2006-0044.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/21262
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25607
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2006_08_openssh.html
vendor-advisory
x_refsource_SUSE
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/2490
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/0306
vdb-entry
x_refsource_VUPEN
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
vendor-advisory
x_refsource_SLACKWARE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/21129
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1015540
vdb-entry
x_refsource_SECTRACK
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/21724
third-party-advisory
x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/23241
third-party-advisory
x_refsource_SECUNIA
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
vendor-advisory
x_refsource_OPENBSD
http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
vendor-advisory
x_refsource_SUNALERT
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/18850
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22196
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2006-0698.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/18595
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/18964
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-255-1
vendor-advisory
x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
vdb-entry
signature
x_refsource_OVAL
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
vendor-advisory
x_refsource_SGI
http://secunia.com/advisories/18910
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/16369
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/25936
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18798
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0298.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/18970
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/21492
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.trustix.org/errata/2006/0004
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/19159
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18650
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18736
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/22692
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.vupen.com/english/advisories/2007/2120
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/18579
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18969
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/20723
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://securityreason.com/securityalert/462
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://www.securityfocus.com/archive/1/425397/100/0/threaded
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0044.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/21262
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25607
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.novell.com/linux/security/advisories/2006_08_openssh.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/2490
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/0306
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/21129
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1015540
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/21724
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/23241
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
Resource:
x_refsource_CONFIRM
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/18850
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22196
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/18595
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/18964
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-255-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://secunia.com/advisories/18910
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/16369
vdb-entry
x_refsource_BID
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/25936
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18798
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0298.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/18970
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/21492
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.trustix.org/errata/2006/0004
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/19159
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18650
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18736
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/22692
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.vupen.com/english/advisories/2007/2120
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/18579
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18969
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/20723
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
vdb-entry
x_refsource_XF
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://securityreason.com/securityalert/462
third-party-advisory
x_refsource_SREASON
x_transferred
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4869
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://www.securityfocus.com/archive/1/425397/100/0/threaded
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0044.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/21262
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25607
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
x_transferred
http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
x_refsource_CONFIRM
x_transferred
http://www.novell.com/linux/security/advisories/2006_08_openssh.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/2490
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/0306
vdb-entry
x_refsource_VUPEN
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
vendor-advisory
x_refsource_SLACKWARE
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/21129
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1015540
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/21724
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/23241
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
x_transferred
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
x_refsource_CONFIRM
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/18850
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22196
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0698.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/18595
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/18964
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-255-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
vdb-entry
signature
x_refsource_OVAL
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
vendor-advisory
x_refsource_SGI
x_transferred
http://secunia.com/advisories/18910
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/16369
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/25936
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18798
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0298.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/18970
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/21492
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0004
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/19159
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18650
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18736
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/22692
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2120
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/18579
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18969
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/20723
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://securityreason.com/securityalert/462
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/425397/100/0/threaded
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0044.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/21262
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25607
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_08_openssh.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/2490
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/0306
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/21129
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1015540
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/21724
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/23241
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/18850
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22196
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/18595
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/18964
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-255-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://secunia.com/advisories/18910
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:25 Jan, 2006 | 11:03
Updated At:03 Apr, 2025 | 01:03

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

OpenBSD
openbsd
>>openssh>>3.0
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1p1
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2p1
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0p1
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1p1
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.2p1
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.3p1
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3p1
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4p1
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5p1
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p1
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p2
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1p2
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1p1
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1p1
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.0p1
cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.1p1
cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.2p1
cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2009-09-09T00:00:00

This issue was addressed in Red Hat Enterprise Linux 2.1, 3 and 4: https://rhn.redhat.com/errata/CVE-2006-0225.html https://www.redhat.com/security/data/cve/CVE-2006-0225.html Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.

References
HyperlinkSourceResource
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patchsecalert@redhat.com
N/A
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.ascsecalert@redhat.com
N/A
http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerabilitysecalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=305214secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/18579secalert@redhat.com
N/A
http://secunia.com/advisories/18595secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/18650secalert@redhat.com
N/A
http://secunia.com/advisories/18736secalert@redhat.com
N/A
http://secunia.com/advisories/18798secalert@redhat.com
N/A
http://secunia.com/advisories/18850secalert@redhat.com
N/A
http://secunia.com/advisories/18910secalert@redhat.com
N/A
http://secunia.com/advisories/18964secalert@redhat.com
N/A
http://secunia.com/advisories/18969secalert@redhat.com
N/A
http://secunia.com/advisories/18970secalert@redhat.com
N/A
http://secunia.com/advisories/19159secalert@redhat.com
N/A
http://secunia.com/advisories/20723secalert@redhat.com
N/A
http://secunia.com/advisories/21129secalert@redhat.com
N/A
http://secunia.com/advisories/21262secalert@redhat.com
N/A
http://secunia.com/advisories/21492secalert@redhat.com
N/A
http://secunia.com/advisories/21724secalert@redhat.com
N/A
http://secunia.com/advisories/22196secalert@redhat.com
N/A
http://secunia.com/advisories/23241secalert@redhat.com
N/A
http://secunia.com/advisories/23340secalert@redhat.com
N/A
http://secunia.com/advisories/23680secalert@redhat.com
N/A
http://secunia.com/advisories/24479secalert@redhat.com
N/A
http://secunia.com/advisories/25607secalert@redhat.com
N/A
http://secunia.com/advisories/25936secalert@redhat.com
N/A
http://securityreason.com/securityalert/462secalert@redhat.com
N/A
http://securitytracker.com/id?1015540secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-158.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-174.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2007-246.htmsecalert@redhat.com
N/A
http://www.gentoo.org/security/en/glsa/glsa-200602-11.xmlsecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:034secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_08_openssh.htmlsecalert@redhat.com
N/A
http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/22692secalert@redhat.com
N/A
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0044.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0298.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0698.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/425397/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/16369secalert@redhat.com
N/A
http://www.trustix.org/errata/2006/0004secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-255-1secalert@redhat.com
N/A
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlsecalert@redhat.com
US Government Resource
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlsecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/0306secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/2490secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4869secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0930secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2120secalert@redhat.com
N/A
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688secalert@redhat.com
N/A
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751secalert@redhat.com
N/A
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24305secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962secalert@redhat.com
N/A
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patchaf854a3a-2127-422b-91ae-364da2661108
N/A
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerabilityaf854a3a-2127-422b-91ae-364da2661108
N/A
http://docs.info.apple.com/article.html?artnum=305214af854a3a-2127-422b-91ae-364da2661108
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112af854a3a-2127-422b-91ae-364da2661108
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18579af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18595af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://secunia.com/advisories/18650af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18736af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18798af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18850af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18910af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18964af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18969af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18970af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19159af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/20723af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21129af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21262af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21492af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21724af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22196af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23241af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23340af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23680af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/24479af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/25607af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/25936af854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/462af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015540af854a3a-2127-422b-91ae-364da2661108
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-158.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-174.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2007-246.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.gentoo.org/security/en/glsa/glsa-200602-11.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:034af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_08_openssh.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/22692af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2006-0044.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2006-0298.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2006-0698.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/425397/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/16369af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.trustix.org/errata/2006/0004af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/usn-255-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlaf854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/0306af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/2490af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4869af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/0930af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/2120af854a3a-2127-422b-91ae-364da2661108
N/A
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688af854a3a-2127-422b-91ae-364da2661108
N/A
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24305af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18579
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18595
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/18650
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18736
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18798
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18850
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18910
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18964
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18969
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/18970
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/19159
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/20723
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21129
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21262
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21492
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21724
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22196
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23241
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23340
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23680
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24479
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25607
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25936
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/462
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015540
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_08_openssh.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/22692
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0044.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0298.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/425397/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/16369
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2006/0004
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-255-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0306
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/2490
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2120
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102961_security_vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18579
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18595
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/18650
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18736
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18798
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18850
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18910
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18964
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18969
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18970
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19159
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/20723
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/21129
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/21262
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/21492
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/21724
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22196
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23241
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23340
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23680
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/24479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/25607
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/25936
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/462
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015540
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.425802
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102961-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-158.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-246.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200602-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:034
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_08_openssh.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openpkg.org/security/OpenPKG-SA-2006.003-openssh.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/22692
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00062.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0044.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0298.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/425397/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/16369
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2006/0004
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-255-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0306
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/2490
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2120
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24305
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1138
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9962
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

14Records found

CVE-2006-0098
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.08% / 23.49%
||
7 Day CHG~0.00%
Published-06 Jan, 2006 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dupfdopen function in sys/kern/kern_descrip.c in OpenBSD 3.7 and 3.8 allows local users to re-open arbitrary files by using setuid programs to access file descriptors using /dev/fd/.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2006-5218
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.08% / 23.49%
||
7 Day CHG~0.00%
Published-09 Oct, 2006 | 22:00
Updated-07 Aug, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl.

Action-Not Available
Vendor-n/aOpenBSDNetBSD
Product-openbsdnetbsdn/a
CVE-2004-0482
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.09% / 25.87%
||
7 Day CHG~0.00%
Published-20 May, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in (1) procfs_cmdline.c, (2) procfs_fpregs.c, (3) procfs_linux.c, (4) procfs_regs.c, (5) procfs_status.c, and (6) procfs_subr.c in procfs for OpenBSD 3.5 and earlier allow local users to read sensitive kernel memory and possibly perform other unauthorized activities.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2001-1415
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.10% / 27.43%
||
7 Day CHG~0.00%
Published-18 Mar, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

vi.recover in OpenBSD before 3.1 allows local users to remove arbitrary zero-byte files such as device nodes.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2004-0114
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.33% / 55.34%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The shmat system call in the System V Shared Memory interface for FreeBSD 5.2 and earlier, NetBSD 1.3 and earlier, and OpenBSD 2.6 and earlier, does not properly decrement a shared memory segment's reference count when the vm_map_find function fails, which could allow local users to gain read or write access to a portion of kernel memory and gain privileges.

Action-Not Available
Vendor-n/aOpenBSDNetBSDFreeBSD Foundation
Product-netbsdopenbsdfreebsdn/a
CVE-2003-0955
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.44% / 62.40%
||
7 Day CHG~0.00%
Published-21 Nov, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2000-1004
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.09% / 26.06%
||
7 Day CHG~0.00%
Published-22 Jan, 2001 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-2000-0313
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 22.64%
||
7 Day CHG~0.00%
Published-07 May, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in OpenBSD 2.6 allows a local user to change interface media configurations.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-1999-0724
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.09% / 25.86%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CVE-1999-0303
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 17.00%
||
7 Day CHG~0.00%
Published-29 Sep, 1999 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.

Action-Not Available
Vendor-digitaln/aOpenBSDNetBSDSun Microsystems (Oracle Corporation)
Product-netbsdopenbsdsolarissunososf_1n/a
CVE-2019-19520
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.23% / 83.85%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 23:34
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-19519
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.13%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 23:34
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.

Action-Not Available
Vendor-n/aOpenBSD
Product-openbsdn/a
CWE ID-CWE-287
Improper Authentication
CVE-2000-0143
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 22.78%
||
7 Day CHG~0.00%
Published-16 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.

Action-Not Available
Vendor-sshn/aOpenBSD
Product-sshopensshn/a
CVE-2008-1215
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.40% / 60.01%
||
7 Day CHG~0.00%
Published-09 Mar, 2008 | 02:00
Updated-07 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~" characters.

Action-Not Available
Vendor-n/aOpenBSDFreeBSD FoundationNetBSD
Product-openbsdfreebsdnetbsdn/a
CWE ID-CWE-264
Not Available
Details not found