Executive Summary
Summary | |
---|---|
Title | ssh channel bug |
Informations | |||
---|---|---|---|
Name | DSA-119 | First vendor Publication | 2002-03-07 |
Vendor | Debian | Last vendor Modification | 2002-03-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Joost Pol Since Debian 2.2 (potato) shipped with OpenSSH (the "ssh" package) version 1.2.3, it is not vulnerable to this exploit. No fix is required for Debian 2.2 (potato). The Debian unstable and testing archives do include a more recent OpenSSH (ssh) package. If you are running these pre-release distributions you should ensure that you are running version 3.0.2p1-8, a patched version which was added to the unstable archive today, or a later version. |
Original Source
Url : http://www.debian.org/security/2002/dsa-119 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-193 | Off-by-one Error |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : OpenSSH Channel Code Off by 1 File : nvt/openssh_channel.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
730 | OpenSSH Channel Code Off by One Remote Privilege Escalation OpenSSH contains an 'Off by One' error in the channel code, which an existing local user can use to gain root privileges. A malicious ssh server could also use this bug to exploit a connecting vulnerable client. No further details have been provided. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-29 | Name : The SSH service running on the remote host has an information disclosure vuln... File : sunssh_plaintext_recovery.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2002-019.nasl - Type : ACT_GATHER_INFO |
2002-03-07 | Name : Arbitrary code may be run on the remote host. File : openssh_channel.nasl - Type : ACT_GATHER_INFO |
2001-11-20 | Name : The remote host has an application that is affected by multiple vulnerabilities. File : openssh_301.nasl - Type : ACT_GATHER_INFO |