Vulnerability Name: | CVE-2002-0640 | ||||||||
Assigned: | 2002-07-03 | ||||||||
Published: | 2002-07-03 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt). | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | ALLOWS_ADMIN_ACCESS | ||||||||
References: | Source: CALDERA Type: UNKNOWN CSSA-2002-030.0 Source: MITRE Type: CNA CVE-2002-0640 Source: CONECTIVA Type: UNKNOWN CLA-2002:502 Source: BUGTRAQ Type: UNKNOWN 20020626 OpenSSH Security Advisory (adv.iss) Source: BUGTRAQ Type: UNKNOWN 20020626 Revised OpenSSH Security Advisory (adv.iss) Source: BUGTRAQ Type: UNKNOWN 20020627 How to reproduce OpenSSH Overflow. Source: BUGTRAQ Type: UNKNOWN 20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability Source: CERT Type: US Government Resource CA-2002-18 Source: DEBIAN Type: UNKNOWN DSA-134 Source: CERT-VN Type: US Government Resource VU#369347 Source: ENGARDE Type: UNKNOWN ESA-20020702-016 Source: MANDRAKE Type: UNKNOWN MDKSA-2002:040 Source: SUSE Type: UNKNOWN SuSE-SA:2002:024 Source: OSVDB Type: UNKNOWN 839 Source: REDHAT Type: UNKNOWN RHSA-2002:127 Source: REDHAT Type: UNKNOWN RHSA-2002:131 Source: BID Type: UNKNOWN 5093 Source: HP Type: UNKNOWN HPSBUX0206-195 | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |