Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-0083 | First vendor Publication | 2002-03-15 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0083 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-193 | Off-by-one Error |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : OpenSSH Channel Code Off by 1 File : nvt/openssh_channel.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
730 | OpenSSH Channel Code Off by One Remote Privilege Escalation OpenSSH contains an 'Off by One' error in the channel code, which an existing local user can use to gain root privileges. A malicious ssh server could also use this bug to exploit a connecting vulnerable client. No further details have been provided. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-29 | Name : The SSH service running on the remote host has an information disclosure vuln... File : sunssh_plaintext_recovery.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2002-019.nasl - Type : ACT_GATHER_INFO |
2002-03-07 | Name : Arbitrary code may be run on the remote host. File : openssh_channel.nasl - Type : ACT_GATHER_INFO |
2001-11-20 | Name : The remote host has an application that is affected by multiple vulnerabilities. File : openssh_301.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:24:00 |
|
2024-11-28 12:04:56 |
|
2024-08-03 01:01:54 |
|
2024-08-02 12:02:08 |
|
2024-08-02 01:01:18 |
|
2024-02-02 09:28:20 |
|
2024-02-02 01:01:56 |
|
2024-02-01 12:01:20 |
|
2023-09-05 12:01:51 |
|
2023-09-05 01:01:11 |
|
2023-09-02 12:01:52 |
|
2023-09-02 01:01:11 |
|
2023-08-12 12:02:13 |
|
2023-08-12 01:01:11 |
|
2023-08-11 12:01:56 |
|
2023-08-11 01:01:12 |
|
2023-08-06 12:01:47 |
|
2023-08-06 01:01:12 |
|
2023-08-04 12:01:50 |
|
2023-08-04 01:01:12 |
|
2023-07-14 12:01:49 |
|
2023-07-14 01:01:12 |
|
2023-03-29 01:01:48 |
|
2023-03-28 12:01:17 |
|
2022-10-11 12:01:37 |
|
2022-10-11 01:01:05 |
|
2022-08-05 12:01:46 |
|
2021-05-04 12:01:37 |
|
2021-04-22 01:01:44 |
|
2020-07-25 12:01:04 |
|
2020-05-23 00:14:54 |
|
2016-10-18 12:00:59 |
|
2016-06-28 14:58:11 |
|
2014-02-17 10:24:27 |
|
2013-05-11 12:08:05 |
|