OpenSSH_10.0p2 (portable verion) Buffer overflow 0day vulnerability
by l33tfg - 04-07-25, 08:53 AM
#1
Hello Demonforums Community, Today I have discovered a Buffer overflow vulnerability (0day) inside OpenSSH_10.0p2 (portable version), and I have also crafted an Exploit for the vulnerability

The vulnerability type is A buffer Overflow

Vulnerability found in: https://github.com/openssh/openssh-porta...r/packet.c

How the vulnerability works: https://snippet.host/fgkicg

Here is the exploit I made for it: files.catbox.moe/2ujs98.py

[Image: ssh.png]
Reply
#2
false claim
Reply
#3
(29-08-25, 11:04 PM)daniboi245 Wrote: false claim

Okay, lets break this down


Number 1: this was posted a while back ago, and has had thousands of views across various forums, and this was a vulnerability found on a public github repository, OpenSSH is open source (Via the name) the patch has likely been implemented long before your shit comment


Number 2: Your being massively hypocritical, you left a comment saying "Thanks for sharing" on an Obviously Fake Instagram unban tutorial, which directs people to an offsite telegram channel, so shut the fuck up.


Number 3: Actually contribute something to this forum for once, and stop being a fucking leach.

Number 4: Before giving me Bullshit and saying calling me a liar, what you could have done instead is stop being an actual Retard, and do research before trying an exploit that's months old to make sure, Oh I dunno, it wasn't patched a long time ago, I said how the vulnerability worked lies within ssh_packet_read_poll2(), internally calls sshbuf_get_u32() to parse packet length (plen) But if you look at the Github page I linked, you can clearly see its been updated and fixed, and the command  ssh_packet_read_poll2() no longer exists:  [/url][url=https://prnt.sc/Yyy_Zk0LTyHR]https://prnt.sc/Yyy_Zk0LTyHR
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)