CVE-2004-0175
https://notcve.org/view.php?id=CVE-2004-0175
Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992. Vulnerabilidad de atravesamiento de directorios en scp de OpenSSH anteriores a 3.4p1 permite a servidores remotos maliciosos sobreescribir ficheros de su eleccion. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000831 http://secunia.com/advisories/17135 http://secunia.com/advisories/19243 http://www.ciac.org/ciac/bulletins/o-212.shtml http://www.juniper.net/support/security/alerts/adv59739.txt http://www.mandriva.com/security/advisories?name=MDKSA-2005:100 http://www.mandriva.com/security/advisories?name=MDVSA-2008:191 http://www.novell.com/linux/s • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2003-1562
https://notcve.org/view.php?id=CVE-2003-1562
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747 http://www.securityfocus.com/archive/1/320153 http://www.securityfocus.com/archive/1/320302 http://www.securityfocus.com/archive/1/320440 http://www.securityfocus.com/bid/7482 https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2003-0682
https://notcve.org/view.php?id=CVE-2003-0682
"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695. "Errores de Memoria" en OpenSSH 3.7.1 y anteriores, con impacto desconocido, un grupo de vulnerabilidades distinto de CAN-2003-0693 y CAN-2003-0695. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106381409220492&w=2 http://www.debian.org/security/2003/dsa-382 http://www.debian.org/security/2003/dsa-383 http://www.redhat.com/support/errata/RHSA-2003-280.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A446 https://access.redhat.com/security/cve/CVE-2003-0682 https://bugzilla& •
CVE-2003-0695
https://notcve.org/view.php?id=CVE-2003-0695
Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693. Múltiples "errores de gestión de búferes" en OpenSSH anteriores a 3.7.1 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario usando (1) buffer_init en buffer.c, (2) buffer_free en buffer.c o (3) una función separada en channels.c, un vulnerabilidad distinta de CAN-2003-0693. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106381396120332&w=2 http://marc.info/?l=bugtraq&m=106381409220492&w=2 http://marc.info/? •
CVE-2003-0693
https://notcve.org/view.php?id=CVE-2003-0693
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. Un "error de gestión de búfer" en buffer_append_space de buffer.c de OpenSSH anteriores a 3.7 puede permitir a atacantes remotos ejecutar código arbitrario causando que una cantidad incorrecta de memoria sea liberada, y corrompiendo el montón. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010135.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010146.html http://marc.info/?l=bugtraq&m=106373247528528&w=2 http://marc.info/?l=bugtraq&m=106373546332230&w=2 http://marc.info/?l=bugtraq&m=106374466212309&w=2 http://marc.info/?l=bugtraq&m=106381396120332&w=2 http://marc.info/? •