Vulnerability Name: | CVE-2001-0156 (CCN-6148) | ||||||||
Assigned: | 2001-02-16 | ||||||||
Published: | 2001-02-16 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | VShell SSH gateway 1.0.1 and earlier has a default port forwarding rule of 0.0.0.0/0.0.0.0, which could allow local users to conduct arbitrary port forwarding to other systems. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2001-0156 Source: ATSTAKE Type: Exploit, Patch, Vendor Advisory A021601-1 Source: CCN Type: OSVDB ID: 1765 Van Dyke Technologies VShell Port Forwarding Source: BID Type: UNKNOWN 2402 Source: CCN Type: BID-2402 Van Dyke Technologies VShell Port Forwarding Vulnerability Source: CCN Type: Van Dyke Technology Web site Download - Vshell Source: CONFIRM Type: UNKNOWN http://www.vandyke.com/products/vshell/security102.html Source: CCN Type: @stake, Inc. Security Advisory A021601-1 VShell Code Execution and Port Forwarding Permissions Source: XF Type: UNKNOWN vshell-port-forwarding-rule(6148) Source: XF Type: UNKNOWN vshell-port-forwarding-rule(6148) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |