First published: Thu Sep 25 2003(Updated: )
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.7.1p1 | |
OpenSSH | =3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0787 has a high severity rating due to the potential for privilege escalation.
To fix CVE-2003-0787, upgrade OpenSSH to version 3.7.2 or later, which contains the necessary security patches.
CVE-2003-0787 affects OpenSSH versions 3.7.1 and 3.7.1p1.
Yes, if exploited, CVE-2003-0787 can allow attackers to gain elevated privileges on the vulnerable system.
CVE-2003-0787 involves the PAM conversation function misinterpreting data structures, allowing stack modification.