First published: Wed Jul 03 2002(Updated: )
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | >=2.9.9<=3.3 | |
OpenSSH | =3.1 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =2.1.1 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =2.5.1 | |
OpenSSH | =3.0 | |
OpenSSH | =2.2 | |
OpenSSH | =3.2 | |
OpenSSH | =1.2.3 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =2.1 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.0.1 | |
OpenSSH | =2.9.9 | |
OpenSSH | =1.2.2 | |
OpenSSH | =2.9p1 | |
OpenSSH | =2.9 | |
OpenSSH | =2.5.2 | |
OpenSSH | =2.3 | |
OpenSSH | =2.5 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =2.9p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0639 is considered a critical vulnerability as it allows remote attackers to execute arbitrary code.
To fix CVE-2002-0639, upgrade your OpenSSH version to 3.4 or later.
CVE-2002-0639 affects OpenSSH versions from 2.9.9 to 3.3, including several specific versions listed in the advisory.
CVE-2002-0639 facilitates remote code execution during challenge response authentication.
Yes, CVE-2002-0639 affects OpenSSH when using SKEY or BSD_AUTH authentication methods.