Buffer overflow in sshd in OpenSSH 2.3.1 up to and including 3.3 may allow remote malicious users to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openbsd openssh 2.3 |
||
openbsd openssh 2.5 |
||
openbsd openssh 3.0.1 |
||
openbsd openssh 3.0.1p1 |
||
openbsd openssh 3.2.2p1 |
||
openbsd openssh 3.2.3p1 |
||
openbsd openssh 2.1.1 |
||
openbsd openssh 2.2 |
||
openbsd openssh 2.9p2 |
||
openbsd openssh 3.0 |
||
openbsd openssh 3.1p1 |
||
openbsd openssh 3.2 |
||
openbsd openssh 1.2.2 |
||
openbsd openssh 2.5.1 |
||
openbsd openssh 2.5.2 |
||
openbsd openssh 2.9 |
||
openbsd openssh 3.0.2 |
||
openbsd openssh 3.0.2p1 |
||
openbsd openssh 3.3 |
||
openbsd openssh 3.3p1 |
||
openbsd openssh 1.2.3 |
||
openbsd openssh 2.1 |
||
openbsd openssh 2.9.9 |
||
openbsd openssh 2.9p1 |
||
openbsd openssh 3.0p1 |
||
openbsd openssh 3.1 |