CVE-2002-0083

9.8 CRITICAL
Published: March 15, 2002 Modified: April 16, 2026
View on NVD

Description

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=101552065005254&w=2
Source: cve@mitre.org
Mailing List
http://marc.info/?l=bugtraq&m=101553908201861&w=2
Source: cve@mitre.org
Mailing List
http://marc.info/?l=bugtraq&m=101561384821761&w=2
Source: cve@mitre.org
Mailing List
http://marc.info/?l=bugtraq&m=101586991827622&w=2
Source: cve@mitre.org
Mailing List Patch
http://online.securityfocus.com/advisories/3960
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://online.securityfocus.com/archive/1/264657
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.debian.org/security/2002/dsa-119
Source: cve@mitre.org
Broken Link Vendor Advisory
http://www.linuxsecurity.com/advisories/other_advisory-1937.html
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.openbsd.org/advisories/ssh_channelalloc.txt
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/730
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/bid/4241
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=101552065005254&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=101553908201861&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=101561384821761&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=101586991827622&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://online.securityfocus.com/advisories/3960
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://online.securityfocus.com/archive/1/264657
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2002/dsa-119
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.iss.net/security_center/static/8383.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.linuxsecurity.com/advisories/other_advisory-1937.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openbsd.org/advisories/ssh_channelalloc.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/730
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-043.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/4241
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
1.5%
81th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

immunix trustix conectiva mandrakesoft openbsd engardelinux redhat openpkg suse