CVE-2002-0575

Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-022.2.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-022.2.txt -
References () http://archives.neohapsis.com/archives/bugtraq/2002-04/0298.html - () http://archives.neohapsis.com/archives/bugtraq/2002-04/0298.html -
References () http://archives.neohapsis.com/archives/bugtraq/2002-04/0394.html - Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2002-04/0394.html - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=102167972421837&w=2 - () http://marc.info/?l=bugtraq&m=102167972421837&w=2 -
References () http://marc.info/?l=vuln-dev&m=101924296115863&w=2 - () http://marc.info/?l=vuln-dev&m=101924296115863&w=2 -
References () http://online.securityfocus.com/archive/1/268718 - () http://online.securityfocus.com/archive/1/268718 -
References () http://online.securityfocus.com/archive/1/269701 - () http://online.securityfocus.com/archive/1/269701 -
References () http://www.iss.net/security_center/static/8896.php - Patch, Vendor Advisory () http://www.iss.net/security_center/static/8896.php - Patch, Vendor Advisory
References () http://www.osvdb.org/781 - () http://www.osvdb.org/781 -
References () http://www.securityfocus.com/bid/4560 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/4560 - Exploit, Patch, Vendor Advisory

Information

Published : 2002-06-18 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0575

Mitre link : CVE-2002-0575

CVE.ORG link : CVE-2002-0575


JSON object : View

Products Affected

openbsd

  • openssh