Description
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Product(s):
- OpenBSD OpenSSH 2.1.1
- OpenBSD OpenSSH 2.1.1 p1
- OpenBSD OpenSSH 2.1.1 p2
- OpenBSD OpenSSH 2.1.1 p3
- OpenBSD OpenSSH 2.1.1 p4
- OpenBSD OpenSSH 2.1
- OpenBSD OpenSSH 2.2
- OpenBSD OpenSSH 2.3
- OpenBSD OpenSSH 2.5.1
- OpenBSD OpenSSH 2.5.1 p1
- OpenBSD OpenSSH 2.5.1 p2
- OpenBSD OpenSSH 2.5.2
- OpenBSD OpenSSH 2.5.2 p2
- OpenBSD OpenSSH 2.5
- OpenBSD OpenSSH 2.9.9
- OpenBSD OpenSSH 2.9.9 p1
- OpenBSD OpenSSH 2.9.9 p2
- OpenBSD OpenSSH 2.9
- OpenBSD OpenSSH 2.9 p1
- OpenBSD OpenSSH 2.9 p2
- OpenBSD OpenSSH 3.0.1
- OpenBSD OpenSSH 3.0.1 p1
- OpenBSD OpenSSH 3.0.2
- OpenBSD OpenSSH 3.0.2 p1
- OpenBSD OpenSSH 3.0
- OpenBSD OpenSSH 3.0 p1
- OpenBSD OpenSSH 3.1
- OpenBSD OpenSSH 3.1 p1
- OpenBSD OpenSSH 3.2
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2002-0575, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-0575 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.