
CVE-2003-0786
https://notcve.org/view.php?id=CVE-2003-0786
25 Sep 2003 — The SSH1 PAM challenge response authentication in OpenSSH 3.7.1 and 3.7.1p1, when Privilege Separation is disabled, does not check the result of the authentication attempt, which can allow remote attackers to gain privileges. La atentificación desafío-respuesta SSH1 PAM en OpenSSH 3.7.1 y 3.7.1p1, cuando la separación de privilegios está desactivada, no comprueba el resultado del intento de autenticación, lo que puede permitir a atacantes remotos ganar privilegios. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010812.html •

CVE-2003-0787
https://notcve.org/view.php?id=CVE-2003-0787
25 Sep 2003 — The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges. La función de conversación PAM en OpenSSH 3.7.1 y 3.7.1p1 interpreta un array de estructuras como un array de punteros, lo que permite a atacantes modificar la pila y posiblemente ganar privilegios. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010812.html •

CVE-2003-0682
https://notcve.org/view.php?id=CVE-2003-0682
18 Sep 2003 — "Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695. "Errores de Memoria" en OpenSSH 3.7.1 y anteriores, con impacto desconocido, un grupo de vulnerabilidades distinto de CAN-2003-0693 y CAN-2003-0695. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 •

CVE-2003-0695
https://notcve.org/view.php?id=CVE-2003-0695
18 Sep 2003 — Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693. Múltiples "errores de gestión de búferes" en OpenSSH anteriores a 3.7.1 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario usando (1) buffer_init en buffer.c, (2) buffer_free en buffer.... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 •

CVE-2003-0693
https://notcve.org/view.php?id=CVE-2003-0693
17 Sep 2003 — A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. Un "error de gestión de búfer" en buffer_append_space de buffer.c de OpenSSH anteriores a 3.7 puede permitir a atacantes remotos ejecutar código arbitrario causando que una cantidad incorrecta de memoria sea liberada, y corrompiendo el montón. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html •

CVE-2003-0386
https://notcve.org/view.php?id=CVE-2003-0386
10 Jun 2003 — OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address. OpenSSH 3.6.1 y anteriores, cuando se restringe el acceso de máquinas por direcciones IP numéricas, y con VerifyReverseMapping desactivado, permite a atacantes remotos evitar restricciones de acceso "from=" y "usuar... • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc •

CVE-2003-0190 – OpenSSH/PAM 3.6.1p1 - 'gossh.sh' Remote Users Ident
https://notcve.org/view.php?id=CVE-2003-0190
02 May 2003 — OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. OpenSSH-portable (OpenSSH) 3.6.1p1 y anteriores con soporte PAM activado envía inmediatamente un mensaje de error cuando un usuario no existe, lo que permite a atacantes remotos determinar nombres de usuario válidos mediante un ataque de temporización. • https://packetstorm.news/files/id/181223 • CWE-203: Observable Discrepancy •

CVE-2002-0765
https://notcve.org/view.php?id=CVE-2002-0765
12 Aug 2002 — sshd in OpenSSH 3.2.2, when using YP with netgroups and under certain conditions, may allow users to successfully authenticate and log in with another user's password. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0235.html •

CVE-2002-0639
https://notcve.org/view.php?id=CVE-2002-0639
03 Jul 2002 — Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt • CWE-190: Integer Overflow or Wraparound •

CVE-2002-0640 – OpenSSH 3.x - Challenge-Response Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-0640
03 Jul 2002 — Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt). • https://www.exploit-db.com/exploits/21579 •