Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2002-0083
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- Critical
- Base Score
- 9.8/10
- Exploit Score
- 3.9/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:conectiva:linux:graficas:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openpkg:openpkg:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:ecommerce:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mandrakesoft:mandrake_single_network_firewall:7.2: |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* |
Yes
|
2.0 | 3.1 | |
cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1 |
Yes
|
- | - | |
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:trustix:secure_linux:1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.linuxsecurity.com/advisories/other_advisory-1937.html
- http://www.debian.org/security/2002/dsa-119
- http://www.openbsd.org/advisories/ssh_channelalloc.txt
- http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html
- http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html
- http://online.securityfocus.com/archive/1/264657
- http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467
- http://www.redhat.com/support/errata/RHSA-2002-043.html
- http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc
- ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt
- ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt
- http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc
- http://online.securityfocus.com/advisories/3960
- http://www.iss.net/security_center/static/8383.php
- http://www.securityfocus.com/bid/4241
- http://www.osvdb.org/730
- http://marc.info/?l=bugtraq&m=101586991827622&w=2
- http://marc.info/?l=bugtraq&m=101552065005254&w=2
- http://marc.info/?l=bugtraq&m=101553908201861&w=2
- http://marc.info/?l=bugtraq&m=101561384821761&w=2