7.2
CVSSv2

CVE-2002-1715

Published: 31/12/2002 Updated: 11/07/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

Vulnerable Product Search on Vulmon Subscribe to Product

ssh ssh 1.2.0

ssh ssh 1.2.16

ssh ssh 1.2.1

ssh ssh 1.2.10

ssh ssh 1.2.18

ssh ssh 1.2.19

ssh ssh 1.2.25

ssh ssh 1.2.26

ssh ssh 1.2.4

ssh ssh 1.2.5

ssh ssh2 2.0.11

ssh ssh2 2.0.12

ssh ssh2 2.0.7

ssh ssh2 2.0.8

ssh ssh2 3.0

ssh ssh 1.2.11

ssh ssh 1.2.12

ssh ssh 1.2.2

ssh ssh 1.2.20

ssh ssh 1.2.27

ssh ssh 1.2.28

ssh ssh 1.2.6

ssh ssh 1.2.7

ssh ssh2 2.0.13

ssh ssh2 2.0.2

ssh ssh2 2.0.9

ssh ssh2 2.1

ssh ssh 1.2.17

ssh ssh 1.2.23

ssh ssh 1.2.24

ssh ssh 1.2.30

ssh ssh 1.2.31

ssh ssh2 2.0.1

ssh ssh2 2.0.10

ssh ssh2 2.0.5

ssh ssh2 2.0.6

ssh ssh2 2.4

ssh ssh2 2.5

ssh ssh 1.2.13

ssh ssh 1.2.14

ssh ssh 1.2.15

ssh ssh 1.2.21

ssh ssh 1.2.22

ssh ssh 1.2.29

ssh ssh 1.2.3

ssh ssh 1.2.8

ssh ssh 1.2.9

ssh ssh2 2.0

ssh ssh2 2.0.3

ssh ssh2 2.0.4

ssh ssh2 2.2

ssh ssh2 2.3

Exploits

source: wwwsecurityfocuscom/bid/4547/info SSH (and derivatives) is the protocol Secure Shell protocol implementation It is available for various operating systems, although this vulnerability affects operating systems such as Unix and Linux It has been reported that it is possible for a remote user to upload files to world-writeable di ...