CVE-2002-0639

Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
References
Link Resource
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt Broken Link
http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 Broken Link
http://marc.info/?l=bugtraq&m=102514371522793&w=2 Exploit Mailing List
http://marc.info/?l=bugtraq&m=102514631524575&w=2 Exploit Mailing List
http://marc.info/?l=bugtraq&m=102521542826833&w=2 Exploit Mailing List
http://www.cert.org/advisories/CA-2002-18.html Third Party Advisory US Government Resource
http://www.debian.org/security/2002/dsa-134 Broken Link
http://www.iss.net/security_center/static/9169.php Broken Link
http://www.kb.cert.org/vuls/id/369347 Third Party Advisory US Government Resource
http://www.linuxsecurity.com/advisories/other_advisory-2177.html Broken Link
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 Broken Link
http://www.osvdb.org/6245 Broken Link
http://www.securityfocus.com/bid/5093 Broken Link Third Party Advisory VDB Entry
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 Broken Link
https://twitter.com/RooneyMcNibNug/status/1152332585349111810 Broken Link
https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html Third Party Advisory
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt Broken Link
http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 Broken Link
http://marc.info/?l=bugtraq&m=102514371522793&w=2 Exploit Mailing List
http://marc.info/?l=bugtraq&m=102514631524575&w=2 Exploit Mailing List
http://marc.info/?l=bugtraq&m=102521542826833&w=2 Exploit Mailing List
http://www.cert.org/advisories/CA-2002-18.html Third Party Advisory US Government Resource
http://www.debian.org/security/2002/dsa-134 Broken Link
http://www.iss.net/security_center/static/9169.php Broken Link
http://www.kb.cert.org/vuls/id/369347 Third Party Advisory US Government Resource
http://www.linuxsecurity.com/advisories/other_advisory-2177.html Broken Link
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 Broken Link
http://www.osvdb.org/6245 Broken Link
http://www.securityfocus.com/bid/5093 Broken Link Third Party Advisory VDB Entry
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 Broken Link
https://twitter.com/RooneyMcNibNug/status/1152332585349111810 Broken Link
https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt - Broken Link () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt - Broken Link
References () http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html - Broken Link
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 - Broken Link () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 - Broken Link
References () http://marc.info/?l=bugtraq&m=102514371522793&w=2 - Exploit, Mailing List () http://marc.info/?l=bugtraq&m=102514371522793&w=2 - Exploit, Mailing List
References () http://marc.info/?l=bugtraq&m=102514631524575&w=2 - Exploit, Mailing List () http://marc.info/?l=bugtraq&m=102514631524575&w=2 - Exploit, Mailing List
References () http://marc.info/?l=bugtraq&m=102521542826833&w=2 - Exploit, Mailing List () http://marc.info/?l=bugtraq&m=102521542826833&w=2 - Exploit, Mailing List
References () http://www.cert.org/advisories/CA-2002-18.html - Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2002-18.html - Third Party Advisory, US Government Resource
References () http://www.debian.org/security/2002/dsa-134 - Broken Link () http://www.debian.org/security/2002/dsa-134 - Broken Link
References () http://www.iss.net/security_center/static/9169.php - Broken Link () http://www.iss.net/security_center/static/9169.php - Broken Link
References () http://www.kb.cert.org/vuls/id/369347 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/369347 - Third Party Advisory, US Government Resource
References () http://www.linuxsecurity.com/advisories/other_advisory-2177.html - Broken Link () http://www.linuxsecurity.com/advisories/other_advisory-2177.html - Broken Link
References () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 - Broken Link () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 - Broken Link
References () http://www.osvdb.org/6245 - Broken Link () http://www.osvdb.org/6245 - Broken Link
References () http://www.securityfocus.com/bid/5093 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/5093 - Broken Link, Third Party Advisory, VDB Entry
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 - Broken Link () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 - Broken Link
References () https://twitter.com/RooneyMcNibNug/status/1152332585349111810 - Broken Link () https://twitter.com/RooneyMcNibNug/status/1152332585349111810 - Broken Link
References () https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html - Third Party Advisory () https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html - Third Party Advisory

08 Feb 2024, 18:37

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-190
CPE cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
References (DEBIAN) http://www.debian.org/security/2002/dsa-134 - (DEBIAN) http://www.debian.org/security/2002/dsa-134 - Broken Link
References (CERT) http://www.cert.org/advisories/CA-2002-18.html - US Government Resource (CERT) http://www.cert.org/advisories/CA-2002-18.html - Third Party Advisory, US Government Resource
References (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 - (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 - Broken Link
References (HP) http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 - (HP) http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=102514631524575&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=102514631524575&w=2 - Exploit, Mailing List
References (MISC) https://twitter.com/RooneyMcNibNug/status/1152332585349111810 - (MISC) https://twitter.com/RooneyMcNibNug/status/1152332585349111810 - Broken Link
References (ISS) https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html - (ISS) https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/5093 - (BID) http://www.securityfocus.com/bid/5093 - Broken Link, Third Party Advisory, VDB Entry
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=102514371522793&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=102514371522793&w=2 - Exploit, Mailing List
References (XF) http://www.iss.net/security_center/static/9169.php - (XF) http://www.iss.net/security_center/static/9169.php - Broken Link
References (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html - (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html - Broken Link
References (ENGARDE) http://www.linuxsecurity.com/advisories/other_advisory-2177.html - (ENGARDE) http://www.linuxsecurity.com/advisories/other_advisory-2177.html - Broken Link
References (OSVDB) http://www.osvdb.org/6245 - (OSVDB) http://www.osvdb.org/6245 - Broken Link
References (CALDERA) ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt - (CALDERA) ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=102521542826833&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=102521542826833&w=2 - Exploit, Mailing List
References (CERT-VN) http://www.kb.cert.org/vuls/id/369347 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/369347 - Third Party Advisory, US Government Resource
References (MANDRAKE) http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 - (MANDRAKE) http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 - Broken Link
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8

Information

Published : 2002-07-03 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0639

Mitre link : CVE-2002-0639

CVE.ORG link : CVE-2002-0639


JSON object : View

Products Affected

openbsd

  • openssh
CWE
CWE-190

Integer Overflow or Wraparound