Vulnerability Details : CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
Threat overview for CVE-2002-0083
Top countries where our scanners detected CVE-2002-0083
Top open port discovered on systems with this issue
22
IPs affected by CVE-2002-0083 1,714
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0083!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0083
Probability of exploitation activity in the next 30 days: 0.87%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0083
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2002-0083
-
Assigned by: nvd@nist.gov (Primary)
-
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.Assigned by: nvd@nist.gov (Primary)
References for CVE-2002-0083
-
http://www.redhat.com/support/errata/RHSA-2002-043.html
SupportBroken Link
-
ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt
Broken Link
-
http://www.osvdb.org/730
404 Not FoundBroken Link
-
http://www.openbsd.org/advisories/ssh_channelalloc.txt
Vendor Advisory
-
http://www.iss.net/security_center/static/8383.php
Broken Link
-
http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt
Broken Link
-
http://online.securityfocus.com/archive/1/264657
Broken Link;Third Party Advisory;VDB Entry
-
ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt
Broken Link
-
http://marc.info/?l=bugtraq&m=101552065005254&w=2
'[PINE-CERT-20020301] OpenSSH off-by-one' - MARCMailing List
-
http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html
Broken Link
-
http://www.linuxsecurity.com/advisories/other_advisory-1937.html
LinuxSecurity Advisories - Page 1Broken Link;Patch;Vendor Advisory
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php
Broken Link
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)Broken Link
-
http://www.debian.org/security/2002/dsa-119
Debian -- The Universal Operating SystemBroken Link;Vendor Advisory
-
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html
Broken Link
-
http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html
404 Page Not Found | SUSEBroken Link
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc
Broken Link
-
http://marc.info/?l=bugtraq&m=101586991827622&w=2
'OpenSSH 2.9.9p2 packages for Immunix 6.2 with latest fix' - MARCMailing List;Patch
-
http://marc.info/?l=bugtraq&m=101561384821761&w=2
'[OpenPKG-SA-2002.002] OpenPKG Security Advisory (openssh)' - MARCMailing List
-
http://marc.info/?l=bugtraq&m=101553908201861&w=2
'OpenSSH Security Advisory (adv.channelalloc)' - MARCMailing List
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc
Broken Link
-
http://online.securityfocus.com/advisories/3960
Broken Link;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/4241
Broken Link;Third Party Advisory;VDB Entry
Products affected by CVE-2002-0083
- cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
- cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:ecommerce:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:graficas:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openpkg:openpkg:1.0:*:*:*:*:*:*:*