Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.014
EPSS Ranking
79.4%
CVSS Severity
CVSS v3 Score
9.8
CVSS v2 Score
10.0
References
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc
ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt
ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt
http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467
http://marc.info/?l=bugtraq&m=101552065005254&w=2
http://marc.info/?l=bugtraq&m=101553908201861&w=2
http://marc.info/?l=bugtraq&m=101561384821761&w=2
http://marc.info/?l=bugtraq&m=101586991827622&w=2
http://online.securityfocus.com/advisories/3960
http://online.securityfocus.com/archive/1/264657
http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt
http://www.debian.org/security/2002/dsa-119
http://www.iss.net/security_center/static/8383.php
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php
http://www.linuxsecurity.com/advisories/other_advisory-1937.html
http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html
http://www.openbsd.org/advisories/ssh_channelalloc.txt
http://www.osvdb.org/730
http://www.redhat.com/support/errata/RHSA-2002-043.html
http://www.securityfocus.com/bid/4241
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc
ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt
ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt
http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467
http://marc.info/?l=bugtraq&m=101552065005254&w=2
http://marc.info/?l=bugtraq&m=101553908201861&w=2
http://marc.info/?l=bugtraq&m=101561384821761&w=2
http://marc.info/?l=bugtraq&m=101586991827622&w=2
http://online.securityfocus.com/advisories/3960
http://online.securityfocus.com/archive/1/264657
http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt
http://www.debian.org/security/2002/dsa-119
http://www.iss.net/security_center/static/8383.php
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php
http://www.linuxsecurity.com/advisories/other_advisory-1937.html
http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html
http://www.openbsd.org/advisories/ssh_channelalloc.txt
http://www.osvdb.org/730
http://www.redhat.com/support/errata/RHSA-2002-043.html
http://www.securityfocus.com/bid/4241
Products affected by CVE-2002-0083
Immunix
»
Immunix
»
Version:
7.0
cpe:2.3:a:immunix:immunix:7.0
Mandrakesoft
»
Mandrake Single Network Firewall
»
Version:
7.2
cpe:2.3:a:mandrakesoft:mandrake_single_network_firewall:7.2
Openbsd
»
Openssh
»
Version:
2.1
cpe:2.3:a:openbsd:openssh:2.1
Openbsd
»
Openssh
»
Version:
2.1.0
cpe:2.3:a:openbsd:openssh:2.1.0
Openbsd
»
Openssh
»
Version:
2.1.1
cpe:2.3:a:openbsd:openssh:2.1.1
Openbsd
»
Openssh
»
Version:
2.2
cpe:2.3:a:openbsd:openssh:2.2
Openbsd
»
Openssh
»
Version:
2.2.0
cpe:2.3:a:openbsd:openssh:2.2.0
Openbsd
»
Openssh
»
Version:
2.3
cpe:2.3:a:openbsd:openssh:2.3
Openbsd
»
Openssh
»
Version:
2.3.0
cpe:2.3:a:openbsd:openssh:2.3.0
Openbsd
»
Openssh
»
Version:
2.3.1
cpe:2.3:a:openbsd:openssh:2.3.1
Openbsd
»
Openssh
»
Version:
2.5
cpe:2.3:a:openbsd:openssh:2.5
Openbsd
»
Openssh
»
Version:
2.5.1
cpe:2.3:a:openbsd:openssh:2.5.1
Openbsd
»
Openssh
»
Version:
2.5.2
cpe:2.3:a:openbsd:openssh:2.5.2
Openbsd
»
Openssh
»
Version:
2.9
cpe:2.3:a:openbsd:openssh:2.9
Openbsd
»
Openssh
»
Version:
2.9.9
cpe:2.3:a:openbsd:openssh:2.9.9
Openbsd
»
Openssh
»
Version:
2.9.9p2
cpe:2.3:a:openbsd:openssh:2.9.9p2
Openbsd
»
Openssh
»
Version:
2.9p1
cpe:2.3:a:openbsd:openssh:2.9p1
Openbsd
»
Openssh
»
Version:
2.9p2
cpe:2.3:a:openbsd:openssh:2.9p2
Openbsd
»
Openssh
»
Version:
3.0
cpe:2.3:a:openbsd:openssh:3.0
Openbsd
»
Openssh
»
Version:
3.0.1
cpe:2.3:a:openbsd:openssh:3.0.1
Openbsd
»
Openssh
»
Version:
3.0.1p1
cpe:2.3:a:openbsd:openssh:3.0.1p1
Openbsd
»
Openssh
»
Version:
3.0.2
cpe:2.3:a:openbsd:openssh:3.0.2
Openbsd
»
Openssh
»
Version:
3.0.2p1
cpe:2.3:a:openbsd:openssh:3.0.2p1
Openbsd
»
Openssh
»
Version:
3.0p1
cpe:2.3:a:openbsd:openssh:3.0p1
Openpkg
»
Openpkg
»
Version:
1.0
cpe:2.3:a:openpkg:openpkg:1.0
Conectiva
»
Linux
»
Version:
5.0
cpe:2.3:o:conectiva:linux:5.0
Conectiva
»
Linux
»
Version:
5.1
cpe:2.3:o:conectiva:linux:5.1
Conectiva
»
Linux
»
Version:
6.0
cpe:2.3:o:conectiva:linux:6.0
Conectiva
»
Linux
»
Version:
7.0
cpe:2.3:o:conectiva:linux:7.0
Conectiva
»
Linux
»
Version:
ecommerce
cpe:2.3:o:conectiva:linux:ecommerce
Conectiva
»
Linux
»
Version:
graficas
cpe:2.3:o:conectiva:linux:graficas
Engardelinux
»
Secure Linux
»
Version:
1.0.1
cpe:2.3:o:engardelinux:secure_linux:1.0.1
Mandrakesoft
»
Mandrake Linux
»
Version:
7.1
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1
Mandrakesoft
»
Mandrake Linux
»
Version:
7.2
cpe:2.3:o:mandrakesoft:mandrake_linux:7.2
Mandrakesoft
»
Mandrake Linux
»
Version:
8.0
cpe:2.3:o:mandrakesoft:mandrake_linux:8.0
Mandrakesoft
»
Mandrake Linux
»
Version:
8.1
cpe:2.3:o:mandrakesoft:mandrake_linux:8.1
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
1.0.1
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1
Redhat
»
Linux
»
Version:
7.0
cpe:2.3:o:redhat:linux:7.0
Redhat
»
Linux
»
Version:
7.1
cpe:2.3:o:redhat:linux:7.1
Redhat
»
Linux
»
Version:
7.2
cpe:2.3:o:redhat:linux:7.2
Suse
»
Suse Linux
»
Version:
6.4
cpe:2.3:o:suse:suse_linux:6.4
Suse
»
Suse Linux
»
Version:
7.0
cpe:2.3:o:suse:suse_linux:7.0
Suse
»
Suse Linux
»
Version:
7.1
cpe:2.3:o:suse:suse_linux:7.1
Suse
»
Suse Linux
»
Version:
7.2
cpe:2.3:o:suse:suse_linux:7.2
Suse
»
Suse Linux
»
Version:
7.3
cpe:2.3:o:suse:suse_linux:7.3
Trustix
»
Secure Linux
»
Version:
1.1
cpe:2.3:o:trustix:secure_linux:1.1
Trustix
»
Secure Linux
»
Version:
1.2
cpe:2.3:o:trustix:secure_linux:1.2
Trustix
»
Secure Linux
»
Version:
1.5
cpe:2.3:o:trustix:secure_linux:1.5
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved