10
CVSSv2

CVE-2003-0693

Published: 22/09/2003 Updated: 03/05/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH prior to 3.7 may allow remote malicious users to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh

Vendor Advisories

Several bugs have been found in OpenSSH's buffer handling It is not known if these bugs are exploitable, but as a precaution an upgrade is advised DSA-383-2: This advisory is an addition to the earlier DSA-383-1 advisory: Solar Designer found four more bugs in OpenSSH that may be exploitable For the Debian stable distribution these bugs have bee ...
New vulnerabilities in the OpenSSH implementation for SSH servers have been announced An affected network device, running an SSH server based on the OpenSSH implementation, may be vulnerable to a Denial of Service (DoS) attack when an exploit script is repeatedly executed against the same device There are workarounds available to mi ...