![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0682
https://notcve.org/view.php?id=CVE-2003-0682
18 Sep 2003 — "Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695. "Errores de Memoria" en OpenSSH 3.7.1 y anteriores, con impacto desconocido, un grupo de vulnerabilidades distinto de CAN-2003-0693 y CAN-2003-0695. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0695
https://notcve.org/view.php?id=CVE-2003-0695
18 Sep 2003 — Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693. Múltiples "errores de gestión de búferes" en OpenSSH anteriores a 3.7.1 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario usando (1) buffer_init en buffer.c, (2) buffer_free en buffer.... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0693
https://notcve.org/view.php?id=CVE-2003-0693
17 Sep 2003 — A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. Un "error de gestión de búfer" en buffer_append_space de buffer.c de OpenSSH anteriores a 3.7 puede permitir a atacantes remotos ejecutar código arbitrario causando que una cantidad incorrecta de memoria sea liberada, y corrompiendo el montón. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0190 – OpenSSH/PAM 3.6.1p1 - 'gossh.sh' Remote Users Ident
https://notcve.org/view.php?id=CVE-2003-0190
02 May 2003 — OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. OpenSSH-portable (OpenSSH) 3.6.1p1 y anteriores con soporte PAM activado envía inmediatamente un mensaje de error cuando un usuario no existe, lo que permite a atacantes remotos determinar nombres de usuario válidos mediante un ataque de temporización. • https://packetstorm.news/files/id/181223 • CWE-203: Observable Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2002-0640 – OpenSSH 3.x - Challenge-Response Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-0640
03 Jul 2002 — Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt). • https://www.exploit-db.com/exploits/21579 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2002-0639
https://notcve.org/view.php?id=CVE-2002-0639
03 Jul 2002 — Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2002-0575 – OpenSSH 2.x/3.x - Kerberos 4 TGT/AFS Token Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-0575
18 Jun 2002 — Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges. • https://www.exploit-db.com/exploits/21402 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2002-0083 – OpenSSH 2.x/3.0.1/3.0.2 - Channel Code Off-by-One
https://notcve.org/view.php?id=CVE-2002-0083
15 Mar 2002 — Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. Error 'off-by-one' en el código de canal de OpenSSH 2.0 a 3.0.2 permite a usuarios locales o a servidores remotos ganar privilegios. • https://www.exploit-db.com/exploits/21314 • CWE-193: Off-by-one Error •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-1507
https://notcve.org/view.php?id=CVE-2001-1507
31 Dec 2001 — OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged. • http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/114.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-0872
https://notcve.org/view.php?id=CVE-2001-0872
21 Dec 2001 — OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. OpenSSH 3.0.1 y anteriores con UseLogin activado no limpia variables de entorno críticas como LD_PRELOAD, lo que permite a usuario locales ganar privilegios de root. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-042.1.txt •