cve/2021/CVE-2021-28041.md

30 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-28041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28041)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
### POC
#### Reference
- https://www.oracle.com//security-alerts/cpujul2021.html
#### Github
- https://github.com/ARPSyndicate/cvemon
2025-09-29 21:09:30 +02:00
- https://github.com/MaulikxLakhani/SSHScout
- https://github.com/OhDamnn/Noregressh
2024-05-25 21:48:12 +02:00
- https://github.com/Totes5706/TotesHTB
- https://github.com/accalina/crowflag
2025-09-29 21:09:30 +02:00
- https://github.com/alvarigno/ChocolateFire-DockerLab
- https://github.com/alvarigno22/ChocolateFire-DockerLab
2024-05-25 21:48:12 +02:00
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
2025-09-29 21:09:30 +02:00
- https://github.com/krlabs/openssh-vulnerabilities
2024-05-25 21:48:12 +02:00
- https://github.com/nmuhammad22/UPennFinalProject
2025-09-29 21:09:30 +02:00
- https://github.com/phanfivequ/xinminxuehui-milou-d46T7p3s8FIwKQp0
- https://github.com/rainyjluke/Nmap-Vulnerability-Scanner
- https://github.com/wooflock/nmap-airgapped-vulnscan
2024-05-25 21:48:12 +02:00