- EPSS 3.14%
- Veröffentlicht 17.11.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The SSH1 PAM challenge response authentication in OpenSSH 3.7.1 and 3.7.1p1, when Privilege Separation is disabled, does not check the result of the authentication attempt, which can allow remote attackers to gain privileges.
CVE-2003-0787
- EPSS 0.46%
- Veröffentlicht 17.11.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
CVE-2003-0682
- EPSS 0.33%
- Veröffentlicht 06.10.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
CVE-2003-0695
- EPSS 1.02%
- Veröffentlicht 06.10.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a differe...
- EPSS 34.66%
- Veröffentlicht 22.09.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CV...
CVE-2003-0386
- EPSS 9.64%
- Veröffentlicht 02.07.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse...
- EPSS 13.61%
- Veröffentlicht 12.05.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
CVE-2002-0765
- EPSS 0.6%
- Veröffentlicht 12.08.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password.
- EPSS 29.36%
- Veröffentlicht 03.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
- EPSS 64.84%
- Veröffentlicht 03.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authenticat...