CVE-2002-0640

Openbsd Openssh - Buffer Overflow

Title source: rule
STIX 2.1

Description

Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).

Exploits (2)

exploitdb WRITEUP VERIFIED
by Gobbles Security · textremoteunix
https://www.exploit-db.com/exploits/21579
exploitdb WORKING POC VERIFIED
by Christophe Devine · textremoteunix
https://www.exploit-db.com/exploits/21578

References (18)

Core 18
Core References
Third Party Advisory, VDB Entry vdb-entry
http://www.osvdb.org/839
Third Party Advisory, VDB Entry vdb-entry
http://www.securityfocus.com/bid/5093
Third Party Advisory vendor-advisory
http://www.debian.org/security/2002/dsa-134
US Government Resource third-party-advisory
http://www.cert.org/advisories/CA-2002-18.html
US Government Resource third-party-advisory
http://www.kb.cert.org/vuls/id/369347

Scores

EPSS 0.6696
EPSS Percentile 98.6%

Details

Status published
Products (26)
openbsd/openssh 1.2.2
openbsd/openssh 1.2.3
openbsd/openssh 2.1
openbsd/openssh 2.1.1
openbsd/openssh 2.2
openbsd/openssh 2.3
openbsd/openssh 2.5
openbsd/openssh 2.5.1
openbsd/openssh 2.5.2
openbsd/openssh 2.9
... and 16 more
Published Jul 03, 2002
Tracked Since Feb 18, 2026