Search CVE reports


Toggle filters

441 – 450 of 471 results


CVE-2006-5229

Negligible priority
Ignored

OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4925

Medium priority
Fixed

packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4343

Medium priority
Fixed

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a...

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-3738

Medium priority
Fixed

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-2940

Medium priority
Fixed

OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in...

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-2937

Medium priority
Fixed

OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages

CVE-2006-5052

Medium priority
Fixed

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-5051

Medium priority
Fixed

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4924

Medium priority
Fixed

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2006-4339

Medium priority
Fixed

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is...

2 affected packages

openssl, openssl097

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl097
Show less packages