7.5
CVSSv2

CVE-2002-0575

Published: 18/06/2002 Updated: 18/10/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in OpenSSH prior to 2.9.9, and 3.x prior to 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh 2.1

openbsd openssh 2.1.1

openbsd openssh 2.9p1

openbsd openssh 2.9p2

openbsd openssh 2.2

openbsd openssh 2.3

openbsd openssh 3.0

openbsd openssh 3.0.1

openbsd openssh 2.5.2

openbsd openssh 2.9

openbsd openssh 2.9.9

openbsd openssh 3.2

openbsd openssh 2.5

openbsd openssh 2.5.1

openbsd openssh 3.0.2

openbsd openssh 3.1

Exploits

source: wwwsecurityfocuscom/bid/4560/info A buffer overflow condition exists in the OpenSSH server The condition is exploitable by attackers with valid user credentials in versions 299 and higher Exploitation does not require valid user credentials in versions prior to 299 The vulnerability is related to the handling of Kerberos 4 ...