First published: Wed Jul 03 2002(Updated: )
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =1.2.2 | |
OpenSSH | =1.2.3 | |
OpenSSH | =2.1 | |
OpenSSH | =2.1.1 | |
OpenSSH | =2.2 | |
OpenSSH | =2.3 | |
OpenSSH | =2.5 | |
OpenSSH | =2.5.1 | |
OpenSSH | =2.5.2 | |
OpenSSH | =2.9 | |
OpenSSH | =2.9.9 | |
OpenSSH | =2.9p1 | |
OpenSSH | =2.9p2 | |
OpenSSH | =3.0 | |
OpenSSH | =3.0.1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =3.2 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.3 | |
OpenSSH | =3.3p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0640 is considered a high severity vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2002-0640, upgrade OpenSSH to a version later than 3.3, which does not contain this vulnerability.
CVE-2002-0640 affects OpenSSH versions from 2.3.1 to 3.3, particularly when using PAM modules with interactive keyboard authentication.
The main risk of CVE-2002-0640 is that attackers can exploit the buffer overflow to execute arbitrary code on the affected server.
While CVE-2002-0640 is an older vulnerability, systems running affected OpenSSH versions could still be at risk if not patched.