Vulnerability Name: | CVE-2002-0575 (CCN-8896) |
Assigned: | 2002-04-19 |
Published: | 2002-04-19 |
Updated: | 2016-10-18 |
Summary: | Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
|
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Privileges |
References: | Source: CALDERA Type: UNKNOWN CSSA-2002-022.2
Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2002-022.0 Linux: OpenSSH ticket and token passing buffer overflow
Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2002-022.2 Linux: REVISED: OpenSSH ticket and token passing buffer overflow
Source: CCN Type: BugTraq Mailing List, Fri Apr 19 2002 - 17:42:51 CDT OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
Source: BUGTRAQ Type: UNKNOWN 20020420 OpenSSH Security Advisory (adv.token)
Source: CCN Type: BugTraq Mailing List, Sat Apr 20 2002 - 22:39:31 CDT OpenSSH Security Advisory (adv.token)
Source: CCN Type: BugTraq Mailing List, Fri Apr 26 2002 - 06:59:49 CDT Revised OpenSSH Security Advisory (adv.token)
Source: BUGTRAQ Type: Patch, Vendor Advisory 20020429 TSLSA-2002-0047 - openssh
Source: CCN Type: BugTraq Mailing List, Fri May 17 2002 - 01:42:42 CDT OpenSSH 3.2.2 released (fwd)
Source: MITRE Type: CNA CVE-2002-0575
Source: BUGTRAQ Type: UNKNOWN 20020517 OpenSSH 3.2.2 released (fwd)
Source: VULN-DEV Type: UNKNOWN 20020419 OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
Source: BUGTRAQ Type: UNKNOWN 20020419 OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
Source: BUGTRAQ Type: UNKNOWN 20020426 Revised OpenSSH Security Advisory (adv.token)
Source: XF Type: Patch, Vendor Advisory openssh-sshd-kerberos-bo(8896)
Source: CCN Type: OpenSSH Web site OpenSSH
Source: OSVDB Type: UNKNOWN 781
Source: CCN Type: OSVDB ID: 781 OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
Source: BID Type: Exploit, Patch, Vendor Advisory 4560
Source: CCN Type: BID-4560 OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
Source: CCN Type: Trustix Secure Linux Security Advisory #2002-0047 Minor security issue
Source: XF Type: UNKNOWN openssh-sshd-kerberos-bo(8896)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:openbsd:openssh:2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.1.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.3:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:openbsd:openssh:2.1.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.3:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.3:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.1.1:p4:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.2.0:p1:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.3.0:p1:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.1:p1:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.1:p2:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.2:p2:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9:p1:*:*:*:*:*:*AND cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |