Search CVE reports


Toggle filters

411 – 420 of 465 results


CVE-2004-2761

Low priority
Fixed

The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509...

2 affected packages

firefox, nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
firefox
nss
Show less packages

CVE-2008-5161

Low priority
Ignored

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2008-4109

Low priority
Fixed

A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2008-3259

Low priority
Not affected

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2008-3234

Negligible priority
Not affected

sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2008-1672

Low priority
Fixed

OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.

1 affected package

openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
Show less packages

CVE-2008-0891

Low priority
Fixed

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of...

1 affected package

openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
Show less packages

CVE-2008-2285

Low priority
Fixed

The ssh-vulnkey tool on Ubuntu Linux 7.04, 7.10, and 8.04 LTS does not recognize authorized_keys lines that contain options, which makes it easier for remote attackers to exploit CVE-2008-0166 by guessing a key that was not...

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages

CVE-2008-0166

Critical priority
Fixed

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force...

7 affected packages

openssh-blacklist, openssh, openssl, openssl-blacklist, openvpn...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh-blacklist
openssh
openssl
openssl-blacklist
openvpn
openvpn-blacklist
ssl-cert
Show all 7 packages Show less packages

CVE-2008-1657

Low priority
Fixed

OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh
Show less packages