CVE-2003-0787

The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010812.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010812.html -
References () http://www.kb.cert.org/vuls/id/209807 - US Government Resource () http://www.kb.cert.org/vuls/id/209807 - US Government Resource
References () http://www.openssh.com/txt/sshpam.adv - () http://www.openssh.com/txt/sshpam.adv -
References () http://www.securityfocus.com/archive/1/338616 - () http://www.securityfocus.com/archive/1/338616 -
References () http://www.securityfocus.com/archive/1/338617 - () http://www.securityfocus.com/archive/1/338617 -
References () http://www.securityfocus.com/bid/8677 - () http://www.securityfocus.com/bid/8677 -

Information

Published : 2003-11-17 05:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0787

Mitre link : CVE-2003-0787

CVE.ORG link : CVE-2003-0787


JSON object : View

Products Affected

openbsd

  • openssh