Download
| Alert*
oval:org.secpod.oval:def:400568
openssh was updated to fix a memory corruption when AES-GCM is used which could lead to remote code execution after successful authentication oval:org.secpod.oval:def:75393 The host is installed with OpenSSH 6.2 or 6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue in mm_newkeys_from_blob function in monitor_wrap.c in sshd. Successful exploitation could allow remote authenticated users to b ... oval:org.secpod.oval:def:21284 The host is missing a patch containing a security fixes, which affects the following package(s):openssh.base.server oval:org.secpod.oval:def:701479 openssh: secure shell client, for secure access to remote machines OpenSSH could be made to run programs if it received specially crafted network traffic from an authenticated user. |