The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010812.html - | |
References | () http://www.kb.cert.org/vuls/id/209807 - US Government Resource | |
References | () http://www.openssh.com/txt/sshpam.adv - | |
References | () http://www.securityfocus.com/archive/1/338616 - | |
References | () http://www.securityfocus.com/archive/1/338617 - | |
References | () http://www.securityfocus.com/bid/8677 - |
Information
Published : 2003-11-17 05:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0787
Mitre link : CVE-2003-0787
CVE.ORG link : CVE-2003-0787
JSON object : View
Products Affected
openbsd
- openssh
CWE