Vulnerability Description
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openssh | 2.1 |
References
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-022.2.txt
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0298.html
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0394.htmlPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=102167972421837&w=2
- http://marc.info/?l=vuln-dev&m=101924296115863&w=2
- http://online.securityfocus.com/archive/1/268718
- http://online.securityfocus.com/archive/1/269701
- http://www.iss.net/security_center/static/8896.phpPatchVendor Advisory
- http://www.osvdb.org/781
- http://www.securityfocus.com/bid/4560ExploitPatchVendor Advisory
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-022.2.txt
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0298.html
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0394.htmlPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=102167972421837&w=2
- http://marc.info/?l=vuln-dev&m=101924296115863&w=2
FAQ
What is CVE-2002-0575?
CVE-2002-0575 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileg...
How severe is CVE-2002-0575?
CVE-2002-0575 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0575?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh.