CVE-2001-0156

VShell SSH gateway 1.0.1 and earlier has a default port forwarding rule of 0.0.0.0/0.0.0.0, which could allow local users to conduct arbitrary port forwarding to other systems.
Configurations

Configuration 1 (hide)

cpe:2.3:a:van_dyke_technologies:vshell:1.0.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:34

Type Values Removed Values Added
References () http://www.atstake.com/research/advisories/2001/a021601-1.txt - Exploit, Patch, Vendor Advisory () http://www.atstake.com/research/advisories/2001/a021601-1.txt - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2402 - () http://www.securityfocus.com/bid/2402 -
References () http://www.vandyke.com/products/vshell/security102.html - () http://www.vandyke.com/products/vshell/security102.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6148 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6148 -

Information

Published : 2001-06-02 04:00

Updated : 2024-11-20 23:34


NVD link : CVE-2001-0156

Mitre link : CVE-2001-0156

CVE.ORG link : CVE-2001-0156


JSON object : View

Products Affected

van_dyke_technologies

  • vshell