search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenSSH contains a one-off overflow of an array in the channel handling code

Vulnerability Note VU#408419

Original Release Date: 2002-03-07 | Last Revised: 2002-04-02

Overview

OpenSSH is a program used to provide secure connection and communications between client and servers. Channels are used to segregate differing traffic between the client and the server.

Description

OpenSSH versions 2.0 - 3.0.2 contain a one-off overflow of an array in the code that handles channels. For an attack against the server, the attacker must be able to authenticate to the system in order to exploit this vulnerability. For an attack against the client, the client must connect to a malicious server.

Impact

An attacker is able to execute arbitrary code with the privileges of the sshd process on the server. The sshd process usually runs as root/superuser. A malicious server is able to execute arbitrary code on the vulnerable client's machine with the privileges of the current user.

Solution

Upgrade to OpenSSH version 3.1.

Vendor Information

408419
 

View all 22 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Joost Pol .

This document was written by Jason Rafail.

Other Information

CVE IDs: CVE-2002-0083
Severity Metric: 25.65
Date Public: 2002-03-07
Date First Published: 2002-03-07
Date Last Updated: 2002-04-02 16:23 UTC
Document Revision: 7

Sponsored by CISA.