
CVE-2002-0639
https://notcve.org/view.php?id=CVE-2002-0639
03 Jul 2002 — Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt • CWE-190: Integer Overflow or Wraparound •

CVE-2002-0640 – OpenSSH 3.x - Challenge-Response Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-0640
03 Jul 2002 — Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt). • https://www.exploit-db.com/exploits/21579 •

CVE-2002-0575 – OpenSSH 2.x/3.x - Kerberos 4 TGT/AFS Token Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-0575
18 Jun 2002 — Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges. • https://www.exploit-db.com/exploits/21402 •

CVE-2002-0083 – OpenSSH 2.x/3.0.1/3.0.2 - Channel Code Off-by-One
https://notcve.org/view.php?id=CVE-2002-0083
15 Mar 2002 — Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. Error 'off-by-one' en el código de canal de OpenSSH 2.0 a 3.0.2 permite a usuarios locales o a servidores remotos ganar privilegios. • https://www.exploit-db.com/exploits/21314 • CWE-193: Off-by-one Error •

CVE-2001-1585
https://notcve.org/view.php?id=CVE-2001-1585
31 Dec 2001 — SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html • CWE-287: Improper Authentication •

CVE-2001-0872
https://notcve.org/view.php?id=CVE-2001-0872
21 Dec 2001 — OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. OpenSSH 3.0.1 y anteriores con UseLogin activado no limpia variables de entorno críticas como LD_PRELOAD, lo que permite a usuario locales ganar privilegios de root. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-042.1.txt •

CVE-2001-0816
https://notcve.org/view.php?id=CVE-2001-0816
06 Dec 2001 — OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0153.html •

CVE-2001-1380
https://notcve.org/view.php?id=CVE-2001-1380
18 Oct 2001 — OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431 •

CVE-2001-1382
https://notcve.org/view.php?id=CVE-2001-1382
27 Sep 2001 — The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used. • http://www.openwall.com/Owl/CHANGES-stable.shtml •

CVE-2001-0529
https://notcve.org/view.php?id=CVE-2001-0529
14 Aug 2001 — OpenSSH version 2.9 and earlier, with X forwarding enabled, allows a local attacker to delete any file named 'cookies' via a symlink attack. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-010.txt.asc •