First published: Tue Jun 18 2002(Updated: )
Buffer overflow in OpenSSH before 2.9.9, and 3.x before 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | =3.1 | |
Openbsd Openssh | =2.1.1 | |
Openbsd Openssh | =2.5.1 | |
Openbsd Openssh | =3.0 | |
Openbsd Openssh | =2.2 | |
Openbsd Openssh | =3.2 | |
Openbsd Openssh | =2.1 | |
Openbsd Openssh | =3.0.2 | |
Openbsd Openssh | =3.0.1 | |
Openbsd Openssh | =2.9.9 | |
Openbsd Openssh | =2.9p1 | |
Openbsd Openssh | =2.9 | |
Openbsd Openssh | =2.5.2 | |
Openbsd Openssh | =2.3 | |
Openbsd Openssh | =2.5 | |
Openbsd Openssh | =2.9p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.