CVE-2002-1644
Published Nov 25, 2002
Last updated 7 years ago
Overview
- Description
- SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397" }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23" }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6" }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E" }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588" }, { "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1162A0E9-A994-4F93-8518-22CF7F7B5254" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100" }, { "criteria": "cpe:2.3:a:ssh:ssh2:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88AA4D9E-2727-4DBD-9A01-B692EA151818" } ], "operator": "OR" } ] } ]