Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
References
Configurations
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt - Broken Link | |
References | () http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html - Broken Link | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 - Broken Link | |
References | () http://marc.info/?l=bugtraq&m=102514371522793&w=2 - Exploit, Mailing List | |
References | () http://marc.info/?l=bugtraq&m=102514631524575&w=2 - Exploit, Mailing List | |
References | () http://marc.info/?l=bugtraq&m=102521542826833&w=2 - Exploit, Mailing List | |
References | () http://www.cert.org/advisories/CA-2002-18.html - Third Party Advisory, US Government Resource | |
References | () http://www.debian.org/security/2002/dsa-134 - Broken Link | |
References | () http://www.iss.net/security_center/static/9169.php - Broken Link | |
References | () http://www.kb.cert.org/vuls/id/369347 - Third Party Advisory, US Government Resource | |
References | () http://www.linuxsecurity.com/advisories/other_advisory-2177.html - Broken Link | |
References | () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 - Broken Link | |
References | () http://www.osvdb.org/6245 - Broken Link | |
References | () http://www.securityfocus.com/bid/5093 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 - Broken Link | |
References | () https://twitter.com/RooneyMcNibNug/status/1152332585349111810 - Broken Link | |
References | () https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html - Third Party Advisory |
08 Feb 2024, 18:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CPE | cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:* |
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* |
References | (DEBIAN) http://www.debian.org/security/2002/dsa-134 - Broken Link | |
References | (CERT) http://www.cert.org/advisories/CA-2002-18.html - Third Party Advisory, US Government Resource | |
References | (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502 - Broken Link | |
References | (HP) http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195 - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=102514631524575&w=2 - Exploit, Mailing List | |
References | (MISC) https://twitter.com/RooneyMcNibNug/status/1152332585349111810 - Broken Link | |
References | (ISS) https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/5093 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=102514371522793&w=2 - Exploit, Mailing List | |
References | (XF) http://www.iss.net/security_center/static/9169.php - Broken Link | |
References | (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html - Broken Link | |
References | (ENGARDE) http://www.linuxsecurity.com/advisories/other_advisory-2177.html - Broken Link | |
References | (OSVDB) http://www.osvdb.org/6245 - Broken Link | |
References | (CALDERA) ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=102521542826833&w=2 - Exploit, Mailing List | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/369347 - Third Party Advisory, US Government Resource | |
References | (MANDRAKE) http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040 - Broken Link | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
Information
Published : 2002-07-03 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0639
Mitre link : CVE-2002-0639
CVE.ORG link : CVE-2002-0639
JSON object : View
Products Affected
openbsd
- openssh
CWE
CWE-190
Integer Overflow or Wraparound