FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-16 19:33:48 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
1e7fa41b-f6ca-4fe8-bd46-0e176b42b14flibssh -- Unsanitized location in scp could lead to unwanted command execution

The libssh team reports:

In an environment where a user is only allowed to copy files and not to execute applications, it would be possible to pass a location which contains commands to be executed in additon.

When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of ssh_scp_new(), it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.


Discovery 2019-11-14
Entry 2020-02-02
libssh
ge 0.4.0 lt 0.8.8

ge 0.9.0 lt 0.9.3

https://www.libssh.org/security/advisories/CVE-2019-14889.txt
https://nvd.nist.gov/vuln/detail/CVE-2019-14889
CVE-2019-14889
2383767c-d224-11e8-9623-a4badb2f4699libssh -- authentication bypass vulnerability

gladiac reports:

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials.


Discovery 2018-10-16
Entry 2018-10-17
libssh
ge 0.6 lt 0.7.6

ge 0.8 lt 0.8.4

https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/
CVE-2018-10933