All the vulnerabilites related to ssh - ssh2
Vulnerability from fkie_nvd
Published
1999-05-13 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
Impacted products
Vendor Product Version
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
    }
  ],
  "id": "CVE-1999-1029",
  "lastModified": "2024-11-20T23:30:06.757",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-05-13T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/277"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-11-25 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
Impacted products
Vendor Product Version
ssh ssh2 3.1
ssh ssh2 3.1.1
ssh ssh2 3.1.2
ssh ssh2 3.1.3
ssh ssh2 3.1.4
ssh ssh2 3.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
    }
  ],
  "evaluatorSolution": "SSH Secure Shell Windows client versions 3.1.5 and 3.2.2 the URL handling mechanism has been fixed so that the maximum URL length is checked and enforced.",
  "id": "CVE-2002-1645",
  "lastModified": "2024-11-20T23:41:47.657",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-11-25T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/140977"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6263"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/287/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/140977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/287/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Impacted products
Vendor Product Version
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12
ssh ssh2 2.0.13
ssh ssh2 2.1
ssh ssh2 2.2
ssh ssh2 2.3
ssh ssh2 2.4
ssh ssh2 2.5
ssh ssh2 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
    }
  ],
  "id": "CVE-2002-1715",
  "lastModified": "2024-11-20T23:41:56.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/archive/1/268446"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/4547"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/archive/1/268446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/4547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-02-24 05:00
Modified
2024-11-20 23:31
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Impacted products
Vendor Product Version
openbsd openssh 1.2
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
    }
  ],
  "id": "CVE-2000-0217",
  "lastModified": "2024-11-20T23:31:59.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2000-02-24T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/1006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/1006"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-06-09 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
Impacted products
Vendor Product Version
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
    }
  ],
  "id": "CVE-1999-1231",
  "lastModified": "2024-11-20T23:30:37.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-06-09T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/14758"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/14758"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-11-25 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
Impacted products
Vendor Product Version
ssh ssh2 2.0.13
ssh ssh2 2.1
ssh ssh2 2.2
ssh ssh2 2.3
ssh ssh2 2.4
ssh ssh2 2.5
ssh ssh2 3.0
ssh ssh2 3.0.1
ssh ssh2 3.1
ssh ssh2 3.1.1
ssh ssh2 3.1.2
ssh ssh2 3.1.3
ssh ssh2 3.1.4
ssh ssh2 3.2
ssh ssh2 3.2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1162A0E9-A994-4F93-8518-22CF7F7B5254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88AA4D9E-2727-4DBD-9A01-B692EA151818",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
    }
  ],
  "id": "CVE-2002-1644",
  "lastModified": "2024-11-20T23:41:47.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-11-25T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/740619"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/286/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/740619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/6247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ssh.com/company/newsroom/article/286/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-01-01 05:00
Modified
2024-11-20 23:28
Severity ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Impacted products
Vendor Product Version
ssh ssh 1.2.27
ssh ssh2 2.0.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
    }
  ],
  "id": "CVE-1999-0398",
  "lastModified": "2024-11-20T23:28:38.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-01-01T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1998-12-29 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
Impacted products
Vendor Product Version
ssh ssh2 2.0.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
    }
  ],
  "id": "CVE-1999-1159",
  "lastModified": "2024-11-20T23:30:27.113",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1998-12-29T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-06-27 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
Impacted products
Vendor Product Version
ssh ssh2 2.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
    }
  ],
  "id": "CVE-2001-0364",
  "lastModified": "2024-11-20T23:35:12.033",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2477"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2002-1645
Vulnerability from cvelistv5
Published
2005-03-28 05:00
Modified
2024-08-08 03:34
Severity ?
Summary
Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL.
References
http://www.securityfocus.com/bid/6263vdb-entry, x_refsource_BID
http://www.ssh.com/company/newsroom/article/287/x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/10723vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/140977third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "6263",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6263"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/newsroom/article/287/"
          },
          {
            "name": "ssh-client-url-bo(10723)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
          },
          {
            "name": "VU#140977",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/140977"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "6263",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6263"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/newsroom/article/287/"
        },
        {
          "name": "ssh-client-url-bo(10723)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
        },
        {
          "name": "VU#140977",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/140977"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL catcher feature for SSH Secure Shell for Workstations client 3.1 to 3.2.0 allows remote attackers to execute arbitrary code via a long URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "6263",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6263"
            },
            {
              "name": "http://www.ssh.com/company/newsroom/article/287/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/newsroom/article/287/"
            },
            {
              "name": "ssh-client-url-bo(10723)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10723"
            },
            {
              "name": "VU#140977",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/140977"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1645",
    "datePublished": "2005-03-28T05:00:00",
    "dateReserved": "2005-03-28T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-1159
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-01 17:02
Severity ?
Summary
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/1471vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=91495920911490&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:02:53.757Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-privileged-port-forward(1471)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
          },
          {
            "name": "19981229 ssh2 security problem (and patch) (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1998-12-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2001-12-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-privileged-port-forward(1471)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
        },
        {
          "name": "19981229 ssh2 security problem (and patch) (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1159",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-privileged-port-forward(1471)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1471"
            },
            {
              "name": "19981229 ssh2 security problem (and patch) (fwd)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=91495920911490\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1159",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:02:53.757Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0398
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:34
Severity ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:34:51.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T07:27:21",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0398",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0398",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:34:51.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-1231
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:02
Severity ?
Summary
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
References
http://www.securityfocus.com/archive/1/14758mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/2276vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:02:53.790Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19990609 ssh advirsory",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/14758"
          },
          {
            "name": "ssh-leak(2276)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19990609 ssh advirsory",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/14758"
        },
        {
          "name": "ssh-leak(2276)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19990609 ssh advirsory",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/14758"
            },
            {
              "name": "ssh-leak(2276)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2276"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1231",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:02:53.790Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0364
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:14
Severity ?
Summary
SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections.
References
http://www.securityfocus.com/bid/2477vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/6241vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=98467799732241&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:14:07.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2477",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2477"
          },
          {
            "name": "ssh-ssheloop-dos(6241)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
          },
          {
            "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2477",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2477"
        },
        {
          "name": "ssh-ssheloop-dos(6241)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
        },
        {
          "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Communications Security sshd 2.4 for Windows allows remote attackers to create a denial of service via a large number of simultaneous connections."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2477",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2477"
            },
            {
              "name": "ssh-ssheloop-dos(6241)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6241"
            },
            {
              "name": "20010315 Remote DoS attack against SSH Secure Shell for Windows Servers",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=98467799732241\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0364",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-05-24T00:00:00",
    "dateUpdated": "2024-08-08T04:14:07.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1715
Vulnerability from cvelistv5
Published
2005-06-21 04:00
Modified
2024-08-08 03:34
Severity ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/8908vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/4547vdb-entry, x_refsource_BID
http://online.securityfocus.com/archive/1/268446mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-bypass-restricted-shells(8908)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
          },
          {
            "name": "4547",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4547"
          },
          {
            "name": "20020418 Restricted Shells",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/268446"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-bypass-restricted-shells(8908)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
        },
        {
          "name": "4547",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4547"
        },
        {
          "name": "20020418 Restricted Shells",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/268446"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-bypass-restricted-shells(8908)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
            },
            {
              "name": "4547",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4547"
            },
            {
              "name": "20020418 Restricted Shells",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/268446"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1715",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1644
Vulnerability from cvelistv5
Published
2005-03-28 05:00
Modified
2024-08-08 03:34
Severity ?
Summary
SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/10710vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/6247vdb-entry, x_refsource_BID
http://www.ssh.com/company/newsroom/article/286/x_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/740619third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-setsid-privilege-elevation(10710)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
          },
          {
            "name": "6247",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6247"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/newsroom/article/286/"
          },
          {
            "name": "VU#740619",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/740619"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-setsid-privilege-elevation(10710)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
        },
        {
          "name": "6247",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6247"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/newsroom/article/286/"
        },
        {
          "name": "VU#740619",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/740619"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-setsid-privilege-elevation(10710)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710"
            },
            {
              "name": "6247",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6247"
            },
            {
              "name": "http://www.ssh.com/company/newsroom/article/286/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/newsroom/article/286/"
            },
            {
              "name": "VU#740619",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/740619"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1644",
    "datePublished": "2005-03-28T05:00:00",
    "dateReserved": "2005-03-28T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2000-0217
Vulnerability from cvelistv5
Published
2000-04-10 04:00
Modified
2024-08-08 05:05
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
References
http://www.securityfocus.com/bid/1006vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:54.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1006",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1006"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-02-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1006",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1006"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1006",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1006"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0217",
    "datePublished": "2000-04-10T04:00:00",
    "dateReserved": "2000-03-22T00:00:00",
    "dateUpdated": "2024-08-08T05:05:54.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-1029
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 16:55
Severity ?
Summary
SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/2193vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=92663402004280&w=2mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/277vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:55:29.464Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh2-bruteforce(2193)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
          },
          {
            "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
          },
          {
            "name": "277",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/277"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh2-bruteforce(2193)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
        },
        {
          "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
        },
        {
          "name": "277",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/277"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1029",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh2-bruteforce(2193)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2193"
            },
            {
              "name": "19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=92663402004280\u0026w=2"
            },
            {
              "name": "277",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/277"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1029",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T16:55:29.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}