CVE-2002-0575
Published Jun 18, 2002
Last updated 8 years ago
Overview
- Description
- Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78135400-BA1A-42AA-BE17-5588442BCF11" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78F2EDC0-3189-4523-882B-9188C852F793" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2991C07-5486-4590-A74E-46A379DD3339" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EB9BE06-0A36-4853-ADF4-9C1A1854278A" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FC57F38-6545-497B-B6DA-FCAF51755988" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C" }, { "criteria": "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B235167-9554-4431-88C5-9472DD36FCDE" }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "580008AC-2667-4708-8F7E-D70416A460EE" }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E05D8E86-EC01-4589-B372-4DEB7845C81F" }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4" }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0211BCE3-0DED-40BA-8A21-1A97B91F71C7" }, { "criteria": "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AD7BB30-AC79-4153-852C-1053DCF4DE53" } ], "operator": "OR" } ] } ]