Vulnerability Details : CVE-2002-0639
Potential exploit
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
Vulnerability category: OverflowExecute code
Products affected by CVE-2002-0639
- cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
Threat overview for CVE-2002-0639
Top countries where our scanners detected CVE-2002-0639
Top open port discovered on systems with this issue
22
IPs affected by CVE-2002-0639 4,008
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0639!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0639
42.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0639
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-02-08 |
CWE ids for CVE-2002-0639
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2002-0639
-
Red Hat 2008-05-15Not vulnerable. This issue did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 3 or later. This issue did not affect the OpenSSL packages as shipped with Red Hat Enterprise Linux 2.1 as they were not compiled with S/Key or BSD_AUTH support. The upstream patch for this issue and CVE-2002-0640 was included in an errata so that users recompiling OpenSSL with support for those authentication methods would also be protected: https://rhn.redhat.com/errata/RHSA-2002-131.html
References for CVE-2002-0639
-
http://www.kb.cert.org/vuls/id/369347
VU#369347 - OpenSSH vulnerabilities in challenge response handlingThird Party Advisory;US Government Resource
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt
Broken Link
-
http://marc.info/?l=bugtraq&m=102521542826833&w=2
'How to reproduce OpenSSH Overflow.' - MARCExploit;Mailing List
-
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195
Broken Link
-
http://marc.info/?l=bugtraq&m=102514631524575&w=2
'Revised OpenSSH Security Advisory (adv.iss)' - MARCExploit;Mailing List
-
http://www.debian.org/security/2002/dsa-134
Debian -- The Universal Operating SystemBroken Link
-
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040
Broken Link
-
https://twitter.com/RooneyMcNibNug/status/1152332585349111810
XBroken Link
-
http://www.cert.org/advisories/CA-2002-18.html
2002 CERT AdvisoriesThird Party Advisory;US Government Resource
-
http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html
Broken Link
-
https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html
advise123Third Party Advisory
-
http://www.linuxsecurity.com/advisories/other_advisory-2177.html
LinuxSecurity Advisories - Page 1Broken Link
-
http://www.securityfocus.com/bid/5093
Broken Link;Third Party Advisory;VDB Entry
-
http://www.iss.net/security_center/static/9169.php
Broken Link
-
http://marc.info/?l=bugtraq&m=102514371522793&w=2
'OpenSSH Security Advisory (adv.iss)' - MARCExploit;Mailing List
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502
Broken Link
-
http://www.osvdb.org/6245
404 Not FoundBroken Link
Jump to