Lucene search

K

7 matches found

CVE
CVE
added 2003/09/22 4:0 a.m.682 views

CVE-2003-0693

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

10CVSS9.6AI score0.21644EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.238 views

CVE-2002-0639

Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.

10CVSS10AI score0.30289EPSS
CVE
CVE
added 2003/05/12 4:0 a.m.199 views

CVE-2003-0190

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.

5CVSS6.3AI score0.14685EPSS
CVE
CVE
added 2003/10/06 4:0 a.m.121 views

CVE-2003-0695

Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.

7.5CVSS9.6AI score0.21644EPSS
CVE
CVE
added 2003/10/06 4:0 a.m.115 views

CVE-2003-0682

"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.

7.5CVSS9.7AI score0.21644EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.56 views

CVE-2001-1380

OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.

7.5CVSS9.3AI score0.04582EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.55 views

CVE-2001-1382

The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.

5CVSS9.5AI score0.00732EPSS