Description
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
Products
- OpenBSD OpenSSH 1.2.2
- OpenBSD OpenSSH 1.2.2
- OpenBSD OpenSSH 1.2.2 p1
- OpenBSD OpenSSH 1.2.3
- OpenBSD OpenSSH 1.2.3
- OpenBSD OpenSSH 1.2.3 p1
- OpenBSD OpenSSH 2.1.1
- OpenBSD OpenSSH 2.1.1
- OpenBSD OpenSSH 2.1.1 p1
- OpenBSD OpenSSH 2.1.1 p2
- OpenBSD OpenSSH 2.1.1 p3
- OpenBSD OpenSSH 2.1.1 p4
- OpenBSD OpenSSH 2.1
- OpenBSD OpenSSH 2.2
- OpenBSD OpenSSH 2.3
- OpenBSD OpenSSH 2.5.1
- OpenBSD OpenSSH 2.5.1
- OpenBSD OpenSSH 2.5.1 p1
- OpenBSD OpenSSH 2.5.1 p2
- OpenBSD OpenSSH 2.5.2
- OpenBSD OpenSSH 2.5.2
- OpenBSD OpenSSH 2.5.2 p2
- OpenBSD OpenSSH 2.5
- OpenBSD OpenSSH 2.9.9
- OpenBSD OpenSSH 2.9.9
- OpenBSD OpenSSH 2.9.9 p1
- OpenBSD OpenSSH 2.9.9 p2
- OpenBSD OpenSSH 2.9
- OpenBSD OpenSSH 2.9
- OpenBSD OpenSSH 2.9 p1
- OpenBSD OpenSSH 2.9 p2
- OpenBSD OpenSSH 2.9 p1
- OpenBSD OpenSSH 2.9 p2
- OpenBSD OpenSSH 3.0.1
- OpenBSD OpenSSH 3.0.1
- OpenBSD OpenSSH 3.0.1 p1
- OpenBSD OpenSSH 3.0.1 p1
- OpenBSD OpenSSH 3.0.2
- OpenBSD OpenSSH 3.0.2
- OpenBSD OpenSSH 3.0.2 p1
- OpenBSD OpenSSH 3.0.2p1
- OpenBSD OpenSSH 3.0
- OpenBSD OpenSSH 3.0
- OpenBSD OpenSSH 3.0 p1
- OpenBSD OpenSSH 3.0 p1
- OpenBSD OpenSSH 3.1
- OpenBSD OpenSSH 3.1
- OpenBSD OpenSSH 3.1 p1
- OpenBSD OpenSSH 3.1 p1
- OpenBSD OpenSSH 3.2.2 p1
- OpenBSD OpenSSH 3.2.3 p1
- OpenBSD OpenSSH 3.2
- OpenBSD OpenSSH 3.3
- OpenBSD OpenSSH 3.3
- OpenBSD OpenSSH 3.3 p1
- OpenBSD OpenSSH 3.3 p1
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-0640, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-0640 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References