[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:400568
openssh was updated to fix a memory corruption when AES-GCM is used which could lead to remote code execution after successful authentication

oval:org.secpod.oval:def:75393
The host is installed with OpenSSH 6.2 or 6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue in mm_newkeys_from_blob function in monitor_wrap.c in sshd. Successful exploitation could allow remote authenticated users to b ...

oval:org.secpod.oval:def:21284
The host is missing a patch containing a security fixes, which affects the following package(s):openssh.base.server

oval:org.secpod.oval:def:701479
openssh: secure shell client, for secure access to remote machines OpenSSH could be made to run programs if it received specially crafted network traffic from an authenticated user.

CPE    2
cpe:/a:openbsd:openssh:6.2
cpe:/a:openbsd:openssh:6.3
CWE    1
CWE-264
*CVE
CVE-2013-4548

© SecPod Technologies