Exploit for CVE-2008-5161
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8, Client and Server and ConnectSecure 6.0 through 6.0.4, Server for Linux on IBM System z 6.0.4, Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1, and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K, and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
Published: 2008-11-19
CVSS: 2.6
CVSS Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N
Download Exploit for CVE-2008-5161 here:
Use Tor Browser to access .onion links.
Check our team here:
https://tatramed.sk/exploit-422-cve-2024-52533/

ADRESA
Líščie údolie 9
841 04 Bratislava
Slovenská republika
KONTAKTY
tel. č.:+421 2 6020 2301
tel. č.: +421 2 6020 2351
e-mail: info@tatramed.sk
FAKTURAČNÉ ÚDAJE
IČO: 47025328
DIČ: 2023706751
IČ DPH: SK2023706751
Copyright 2019-2024 TatraMed Software s.r.o. © All Rights Reserved | Made by MERINEO