ID

VAR-200309-0035


CVE

CVE-2003-0693


TITLE

OpenSSH contains buffer management errors

Trust: 0.8

sources: CERT/CC: VU#333628

DESCRIPTION

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ OpenSSH Project More distributed OpenSSH 3.7 (Portable Edition OpenSSH 3.7p1) Previously, there were deficiencies in buffer management. If a remote attacker receives a packet of a deliberate length that frees other nearby areas when releasing the buffer, the heap area can be destroyed. As a result, remote attackers who exploit this issue sshd Can be put into a denial of service, and arbitrary code execution has been suggested. The routine in which the problem exists is OpenSSH Others that are using similar routines since being used since the initial release of SSH The implementation of may also be affected. SSH Secure Shell/Ciso IOS Has been reported by the vendor to be unaffected by this issue. Also, F-Secure SSH about, 1.3.14 (for Unix) Previously affected, 2.x Since then, the vendor has reported that it will not be affected. Initially this problem (CAN-2003-0693) Is buffer.c Inside buffer_append_space() Discovered in the function, OpenSSH 3.7p1 It was solved with. However, since a similar problem was discovered in other places after that, this problem was solved. OpenSSH 3.7.1p1 Has been released. (CAN-2003-0695) In addition, memory management issues that are different from the above issues (CAN-2003-0682) Has also been reported, OpenSSH 3.7.1p2 It can be solved by updating to. still, Red Hat Linux About the vendor 2003 Year 9 Moon 17 Advisory published by date (RHSA-2003:279-17) Indicated in RPM Updates to the package, Turboinux About the vendor 2003 Year 9 Moon 24 Advisory published on date (TLSA-2003-53) All of these issues are due to updates to the packages indicated in (CAN-2003-0682/CAN-2003-0693/CAN-2003-0695) Can be eliminated.Please refer to the “Overview” for the impact of this vulnerability. The issue may cause a denial of service. This condition can reportedly be triggered by an overly large packet. There are also unconfirmed rumors of an exploit for this vulnerability circulating in the wild. OpenSSH has revised their advisory, pointing out a similar issue in the 'channels.c' source file and an additional issue in 'buffer.c'. Solar Designer has also reportedly pointed out additional instances of the problem that may also present vulnerabilities

Trust: 2.61

sources: NVD: CVE-2003-0693 // CERT/CC: VU#333628 // JVNDB: JVNDB-2003-000274 // BID: 8628

AFFECTED PRODUCTS

vendor:ciscomodel:catosscope:eqversion:5.5

Trust: 3.3

vendor:ciscomodel:catosscope:eqversion:6.1

Trust: 2.7

vendor:ciscomodel:catos csxscope:eqversion:5.3

Trust: 2.4

vendor:ciscomodel:catalyst csxscope:eqversion:60005.3

Trust: 2.4

vendor:mandrivamodel: - scope: - version: -

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.3

Trust: 1.2

vendor:ciscomodel:catos csxscope:eqversion:5.2

Trust: 1.2

vendor:openbsdmodel:opensshscope:lteversion:3.7

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:6.2

Trust: 0.9

vendor:ciscomodel:catosscope:eqversion:5.4

Trust: 0.9

vendor:ciscomodel:catosscope:eqversion:5.1

Trust: 0.9

vendor:ciscomodel:catosscope:eqversion:4.5

Trust: 0.9

vendor:ciscomodel:catalystscope:eqversion:60006.1

Trust: 0.9

vendor:ciscomodel:catalystscope:eqversion:60005.5

Trust: 0.9

vendor:ciscomodel:catalystscope:eqversion:50006.1

Trust: 0.9

vendor:ciscomodel:catalystscope:eqversion:40006.1

Trust: 0.9

vendor:ciscomodel:catalystscope:eqversion:40005.1

Trust: 0.9

vendor:appgate network security abmodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:craymodel: - scope: - version: -

Trust: 0.8

vendor:cycladesmodel: - scope: - version: -

Trust: 0.8

vendor:debian linuxmodel: - scope: - version: -

Trust: 0.8

vendor:f securemodel: - scope: - version: -

Trust: 0.8

vendor:foundrymodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:guardian digitalmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:ibm eservermodel: - scope: - version: -

Trust: 0.8

vendor:ingrianmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mirapointmodel: - scope: - version: -

Trust: 0.8

vendor:netbsdmodel: - scope: - version: -

Trust: 0.8

vendor:network appliancemodel: - scope: - version: -

Trust: 0.8

vendor:nokiamodel: - scope: - version: -

Trust: 0.8

vendor:openpkgmodel: - scope: - version: -

Trust: 0.8

vendor:opensshmodel: - scope: - version: -

Trust: 0.8

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:riverstonemodel: - scope: - version: -

Trust: 0.8

vendor:scomodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackwaremodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:tfsmodel: - scope: - version: -

Trust: 0.8

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel:opensshscope:eqversion:3.7.1p1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:1.1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:sun microsystemsmodel:cobalt raq550scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:6.5

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:7

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:8

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.00

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.04

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.22

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.1

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.2

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.3

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:8.0

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:9

Trust: 0.8

vendor:ciscomodel:catosscope:eqversion:7.1

Trust: 0.6

vendor:ciscomodel:catos csxscope:eqversion:5.1

Trust: 0.6

vendor:ciscomodel:catalystscope:eqversion:50005.1

Trust: 0.6

vendor:ciscomodel:catalystscope:eqversion:50004.5

Trust: 0.6

vendor:ciscomodel:catalystscope:eqversion:40005.5

Trust: 0.6

vendor:ciscomodel:catalystscope:eqversion:40005.2

Trust: 0.6

vendor:openbsdmodel:opensshscope:eqversion:3.7

Trust: 0.6

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:9

Trust: 0.3

vendor:sunmodel:cobalt raqscope:eqversion:550

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.2.1

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.2

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.1

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.9

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.8

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.7

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.6

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.5

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.4

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.1

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.7.2

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.7.1

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.7

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.6.3

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.6.2

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.5.18

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.5.17

Trust: 0.3

vendor:snapgearmodel:osscope:eqversion:1.8.4

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.22

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.21

Trust: 0.3

vendor:sgimodel:irix fscope:eqversion:6.5.21

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.21

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.20

Trust: 0.3

vendor:sgimodel:irix fscope:eqversion:6.5.20

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.20

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.19

Trust: 0.3

vendor:sgimodel:irix fscope:eqversion:6.5.19

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.19

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.7

Trust: 0.3

vendor:redhatmodel:openssh-server-3.5p1-6.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-server-3.4p1-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-server-3.1p1-3.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-server-2.9p2-7.ia64.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-server-2.9p2-7.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-server-2.5.2p2-5.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-clients-3.5p1-6.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-clients-3.4p1-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-clients-3.1p1-3.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-clients-2.9p2-7.ia64.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-clients-2.9p2-7.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-clients-2.5.2p2-5.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-gnome-3.5p1-6.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-gnome-3.4p1-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-gnome-3.1p1-3.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-gnome-2.9p2-7.ia64.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-gnome-2.9p2-7.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-gnome-2.5.2p2-5.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-3.5p1-6.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-3.4p1-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-3.1p1-3.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-2.9p2-7.ia64.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-2.9p2-7.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-askpass-2.5.2p2-5.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-3.5p1-6.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-3.4p1-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-3.1p1-3.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-2.9p2-7.ia64.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-2.9p2-7.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssh-2.5.2p2-5.i386.rpmscope: - version: -

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.7

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.7

Trust: 0.3

vendor:opensshmodel:p2scope:eqversion:3.6.1

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.6.1

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.6.1

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.5

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.5

Trust: 0.3

vendor:opensshmodel:p1-1scope:eqversion:3.4

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.4

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.4

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.3

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.3

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.2.3

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.2.2

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.2

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.1

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.1

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.0.2

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.0.2

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.0.1

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.0.1

Trust: 0.3

vendor:opensshmodel:p1scope:eqversion:3.0

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:3.0

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:2.9.9

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.3

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:1.6.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:1.6

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:1.5.3

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:1.5.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:1.5.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:1.5

Trust: 0.3

vendor:netappmodel:secureadmin for netcachescope:eqversion:5.5

Trust: 0.3

vendor:netappmodel:secureadminscope:eqversion:3.0

Trust: 0.3

vendor:foundrymodel:networks serverironxl/gscope: - version: -

Trust: 0.3

vendor:foundrymodel:networks serverironxlscope: - version: -

Trust: 0.3

vendor:foundrymodel:networks serveriron800scope: - version: -

Trust: 0.3

vendor:foundrymodel:networks serveriron400scope: - version: -

Trust: 0.3

vendor:foundrymodel:networks serverironscope:eqversion:7.1.09

Trust: 0.3

vendor:foundrymodel:networks serverironscope:eqversion:6.0

Trust: 0.3

vendor:foundrymodel:networks serveriron t12scope:eqversion:5.1.10

Trust: 0.3

vendor:foundrymodel:networks ironviewscope: - version: -

Trust: 0.3

vendor:foundrymodel:networks fastironscope:eqversion:7.1.09

Trust: 0.3

vendor:foundrymodel:networks edgeiron 4802fscope:eqversion:0

Trust: 0.3

vendor:foundrymodel:networks bigironscope:eqversion:7.1.09

Trust: 0.3

vendor:f securemodel:sshscope:eqversion:1.3.14

Trust: 0.3

vendor:craymodel:open softwarescope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:7.20.0.03

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:7.10.2.06

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:7.10.1.02

Trust: 0.3

vendor:ciscomodel:webns b4scope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-3.3.2-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-3.3.1-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-3.2.2-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-3.2.1-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-2.5.1-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-2-3.3.2-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:sn storage router sn5428-2-3.3.1-k9scope:eqversion:5428

Trust: 0.3

vendor:ciscomodel:secure intrusion detection systemscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pgw2200 softswitchscope: - version: -

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:4480

Trust: 0.3

vendor:ciscomodel:css11800 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11506 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11503 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11501 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11150 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11050 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11000 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks wireless lan solution enginescope:eqversion:1105

Trust: 0.3

vendor:ciscomodel:ciscoworks hosting solution enginescope:eqversion:1105

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.6(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.6

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.5(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.4(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.4(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.4(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.4(0.63)

Trust: 0.3

vendor:ciscomodel:catos clrscope:eqversion:7.4

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.4

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.3(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.3(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.2(0.65)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:7.1(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.4(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.4(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.4(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(9)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(8.3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(8)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(7)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(6)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(5.10)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(5)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(4)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(3)x1

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(3)x

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(10)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.3(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.2(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(9)

Trust: 0.3

vendor:ciscomodel:catos cvscope:eqversion:5.5

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(8)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(7)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(6)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(5)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(4)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(19)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(18)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(17)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(16.2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(16)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(15)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(14)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(13.5)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(13)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(12)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(11)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(10)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.5(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.4(4)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.4(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.4(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.4(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(4)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:5.1(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(9)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(8)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(7)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(6)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(5)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(4)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(13)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(12)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(11)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(10)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.5(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.4(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.2(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.2(1)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.1(3)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.1(2)

Trust: 0.3

vendor:ciscomodel:catosscope:eqversion:4.1(1)

Trust: 0.3

vendor:ciscomodel:catalyst ws-x6380-namscope:eqversion:76003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-2scope:eqversion:76003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-1scope:eqversion:76003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-2scope:eqversion:76002.2

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-1scope:eqversion:76002.2

Trust: 0.3

vendor:ciscomodel:catalyst ws-x6380-namscope:eqversion:76002.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-x6380-namscope:eqversion:65003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-2scope:eqversion:65003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-1scope:eqversion:65003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-2scope:eqversion:65002.2

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-1scope:eqversion:65002.2

Trust: 0.3

vendor:ciscomodel:catalyst ws-x6380-namscope:eqversion:65002.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60007.6(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60007.5(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60007.1(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60007.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60006.3(4)

Trust: 0.3

vendor:ciscomodel:catalyst panscope:eqversion:60006.3

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60006.2(0.111)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60006.2(0.110)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60006.1(2.13)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60006.1(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.5(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.5(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.5(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.5(13)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.5(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.4.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.4(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.4(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.4(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.4(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60005.4

Trust: 0.3

vendor:ciscomodel:catalyst ws-x6380-namscope:eqversion:60003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-2scope:eqversion:60003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-1scope:eqversion:60003.1

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-2scope:eqversion:60002.2

Trust: 0.3

vendor:ciscomodel:catalyst ws-svc-nam-1scope:eqversion:60002.2

Trust: 0.3

vendor:ciscomodel:catalyst ws-x6380-namscope:eqversion:60002.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50006.3(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50006.1(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50006.1(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50006.1(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(7)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(6)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(13)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.5(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.4.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.4(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.4(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.4(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.4(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.2(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.2(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.2(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.2(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.2

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50005.1(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(9)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(8)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(7)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(6)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(5)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(12)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(11)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:50004.5(10)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:5000

Trust: 0.3

vendor:ciscomodel:catalyst 4912gscope: - version: -

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40007.6(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40007.5(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40007.1.2

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40007.1(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40007.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40006.3.5

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40006.3(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40006.1(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.5.5

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.5(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.5(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.5(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.5(13)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.5(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.4.1

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.4(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.4(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.4(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.4

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.2(7)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.2(6)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.2(5)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.2(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.2(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.2(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40005.1(1)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(9)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(8)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(7)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(6)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(5)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(4)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(3)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(2)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:40004.5(10)

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:4000

Trust: 0.3

vendor:ciscomodel:catalyst 2948gscope: - version: -

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:29005.5(13)

Trust: 0.3

vendor:ciscomodel:catalyst 2980g-ascope: - version: -

Trust: 0.3

vendor:ciscomodel:catalyst 2980gscope: - version: -

Trust: 0.3

vendor:calderamodel:openlinux workstationscope:eqversion:3.1.1

Trust: 0.3

vendor:calderamodel:openlinux serverscope:eqversion:3.1.1

Trust: 0.3

vendor:bluemodel:coat systems sgmescope:eqversion:2.1.6

Trust: 0.3

vendor:bluemodel:coat systems sg2 secure proxyscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems security gateway osscope:eqversion:3.1

Trust: 0.3

vendor:bluemodel:coat systems security gateway os sp1scope:eqversion:2.1.5001

Trust: 0.3

vendor:bluemodel:coat systems security gateway osscope:eqversion:2.1.9

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems cacheos ca/sascope:eqversion:4.1.10

Trust: 0.3

vendor:snapgearmodel:osscope:neversion:1.8.5

Trust: 0.3

vendor:sgimodel:irixscope:neversion:6.5.22

Trust: 0.3

vendor:opensshmodel:p1scope:neversion:3.7.1

Trust: 0.3

vendor:opensshmodel:opensshscope:neversion:3.7.1

Trust: 0.3

vendor:opensshmodel:p1scope:neversion:3.7

Trust: 0.3

vendor:opensshmodel:opensshscope:neversion:3.7

Trust: 0.3

vendor:f securemodel:sshscope:neversion:1.3.15

Trust: 0.3

vendor:ciscomodel:catosscope:neversion:8.1(3)

Trust: 0.3

sources: CERT/CC: VU#333628 // BID: 8628 // JVNDB: JVNDB-2003-000274 // CNNVD: CNNVD-200309-032 // NVD: CVE-2003-0693

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2003-0693
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#333628
value: 28.98

Trust: 0.8

NVD: CVE-2003-0693
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200309-032
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2003-0693
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#333628 // JVNDB: JVNDB-2003-000274 // CNNVD: CNNVD-200309-032 // NVD: CVE-2003-0693

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2003-0693

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200309-032

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 8628 // CNNVD: CNNVD-200309-032

CONFIGURATIONS

sources: JVNDB: JVNDB-2003-000274

PATCH

title:2003120401url:http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-2003120401.shtml

Trust: 0.8

title:HPSBUX0311-302url:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0311-302

Trust: 0.8

title:HPSBUX0309-282url:http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0309-282

Trust: 0.8

title:HPSBUX0311-302url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0311-302.html

Trust: 0.8

title:HPSBUX0309-282url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0309-282.html

Trust: 0.8

title:opensshurl:http://www.miraclelinux.com/support/update/data/openssh.html

Trust: 0.8

title:buffer.advurl:http://www.openssh.com/txt/buffer.adv

Trust: 0.8

title:RHSA-2003:279url:https://rhn.redhat.com/errata/RHSA-2003-279.html

Trust: 0.8

title:471url:http://www.ssh.com/company/newsroom/article/471/

Trust: 0.8

title:56862url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-56862-1

Trust: 0.8

title:56861url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-56861-1

Trust: 0.8

title:56862url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-56862-3

Trust: 0.8

title:56861url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-56861-3

Trust: 0.8

title:550 OpenSSH Security Updateurl:http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng&nav=patchpage

Trust: 0.8

title:TLSA-2003-53url:http://www.turbolinux.com/security/2003/TLSA-2003-53.txt

Trust: 0.8

title:TLSA-2003-51url:http://www.turbolinux.com/security/2003/TLSA-2003-51.txt

Trust: 0.8

title:RHSA-2003:279url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-279J.html

Trust: 0.8

title:TLSA-2003-53url:http://www.turbolinux.co.jp/security/2003/TLSA-2003-53j.txt

Trust: 0.8

title:TLSA-2003-51url:http://www.turbolinux.co.jp/security/2003/TLSA-2003-51j.txt

Trust: 0.8

sources: JVNDB: JVNDB-2003-000274

EXTERNAL IDS

db:CERT/CCid:VU#333628

Trust: 3.2

db:NVDid:CVE-2003-0693

Trust: 2.7

db:XFid:13191

Trust: 1.4

db:BIDid:8628

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2024/07/01/3

Trust: 1.0

db:SECUNIAid:10156

Trust: 0.8

db:JVNDBid:JVNDB-2003-000274

Trust: 0.8

db:FULLDISCid:20030916 THE LOWDOWN ON SSH VULNERABILITY

Trust: 0.6

db:FULLDISCid:20030915 NEW SSH EXPLOIT?

Trust: 0.6

db:FULLDISCid:20030915 OPENSSH REMOTE EXPLOIT

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:447

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:2719

Trust: 0.6

db:BUGTRAQid:20030916 OPENSSH BUFFER MANAGEMENT BUG ADVISORY

Trust: 0.6

db:BUGTRAQid:20030917 [OPENPKG-SA-2003.040] OPENPKG SECURITY ADVISORY (OPENSSH)

Trust: 0.6

db:BUGTRAQid:20030916 [SLACKWARE-SECURITY] OPENSSH SECURITY ADVISORY (SSA:2003-259-01)

Trust: 0.6

db:MANDRAKEid:MDKSA-2003:090

Trust: 0.6

db:CERT/CCid:CA-2003-24

Trust: 0.6

db:SUNALERTid:1000620

Trust: 0.6

db:DEBIANid:DSA-383

Trust: 0.6

db:DEBIANid:DSA-382

Trust: 0.6

db:TRUSTIXid:2003-0033

Trust: 0.6

db:REDHATid:RHSA-2003:280

Trust: 0.6

db:REDHATid:RHSA-2003:279

Trust: 0.6

db:CNNVDid:CNNVD-200309-032

Trust: 0.6

sources: CERT/CC: VU#333628 // BID: 8628 // JVNDB: JVNDB-2003-000274 // CNNVD: CNNVD-200309-032 // NVD: CVE-2003-0693

REFERENCES

url:http://www.openssh.com/txt/buffer.adv

Trust: 3.7

url:http://www.cert.org/advisories/ca-2003-24.html

Trust: 3.7

url:http://www.kb.cert.org/vuls/id/333628

Trust: 3.4

url:http://www.redhat.com/support/errata/rhsa-2003-280.html

Trust: 2.6

url:http://www.debian.org/security/2003/dsa-383

Trust: 2.6

url:http://www.debian.org/security/2003/dsa-382

Trust: 2.6

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000620.1-1

Trust: 2.6

url:http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010146.html

Trust: 2.6

url:http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010135.html

Trust: 2.6

url:http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010103.html

Trust: 2.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2003:090

Trust: 2.6

url:http://marc.info/?l=bugtraq&m=106373247528528&w=2

Trust: 2.0

url:http://marc.info/?l=bugtraq&m=106373546332230&w=2

Trust: 2.0

url:http://marc.info/?l=bugtraq&m=106374466212309&w=2

Trust: 2.0

url:http://marc.info/?l=bugtraq&m=106381396120332&w=2

Trust: 2.0

url:http://marc.info/?l=bugtraq&m=106381409220492&w=2

Trust: 2.0

url:http://www.openwall.com/lists/oss-security/2024/07/01/3

Trust: 2.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/13191

Trust: 2.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2719

Trust: 2.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a447

Trust: 2.0

url:http://xforce.iss.net/xforce/xfdb/13191

Trust: 1.4

url:http://marc.theaimsgroup.com/?l=bugtraq&m=106373247528528&w=2

Trust: 1.2

url:http://www.mindrot.org/pipermail/openssh-unix-announce/2003-september/000062.html

Trust: 0.8

url:http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/openssh/files/patch-buffer.c

Trust: 0.8

url:http://www.secunia.com/advisories/10156/

Trust: 0.8

url:http://www.ciac.org/ciac/bulletins/n-151.shtml

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0693

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2003/wr033801.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnca-2003-24

Trust: 0.8

url:http://jvn.jp/tr/trca-2003-24

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0693

Trust: 0.8

url:http://www.securityfocus.com/bid/8628

Trust: 0.8

url:http://www.isskk.co.jp/support/techinfo/general/openssh144.html

Trust: 0.8

url:http://marc.theaimsgroup.com/?l=bugtraq&m=106381409220492&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=106381396120332&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=106374466212309&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=106373546332230&w=2

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:447

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2719

Trust: 0.6

url:http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.368193

Trust: 0.3

url:http://www.bluecoat.com/downloads/support/bcs_openssh_vulnerability.pdf

Trust: 0.3

url:http://www.openwall.com/owl/changes-current.shtml

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20030917-openssh.shtml

Trust: 0.3

url:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000739

Trust: 0.3

url:http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?r1=1.1.1.6&r2=1.1.1.7&f=h

Trust: 0.3

url:http://www.f-secure.com/support/technical/ssh/ssh1_openssh_buffer_management.shtml

Trust: 0.3

url:http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm

Trust: 0.3

url:http://www.netapp.com/support/

Trust: 0.3

url:http://www.stonesoft.com/document/art/3031.html

Trust: 0.3

url:http://www.foundrynet.com/solutions/advisories/openssh333628.html

Trust: 0.3

url:http://www.netscreen.com/services/security/alerts/openssh_1.jsp

Trust: 0.3

url:http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967067.htm

Trust: 0.3

url:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56861

Trust: 0.3

url:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56862

Trust: 0.3

url:http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng&nav=patchpage

Trust: 0.3

url:http://sunsolve.sun.com/patches/linux/security.html

Trust: 0.3

url:http://www.yellowdoglinux.com/resources/errata/ydu-20030917-1.txt

Trust: 0.3

url:/archive/1/337921

Trust: 0.3

sources: CERT/CC: VU#333628 // BID: 8628 // JVNDB: JVNDB-2003-000274 // CNNVD: CNNVD-200309-032 // NVD: CVE-2003-0693

CREDITS

OpenSSH Security Advisory

Trust: 0.6

sources: CNNVD: CNNVD-200309-032

SOURCES

db:CERT/CCid:VU#333628
db:BIDid:8628
db:JVNDBid:JVNDB-2003-000274
db:CNNVDid:CNNVD-200309-032
db:NVDid:CVE-2003-0693

LAST UPDATE DATE

2024-12-11T22:49:52.269000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#333628date:2008-08-12T00:00:00
db:BIDid:8628date:2009-11-05T23:47:00
db:JVNDBid:JVNDB-2003-000274date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200309-032date:2006-03-28T00:00:00
db:NVDid:CVE-2003-0693date:2024-11-20T23:45:18.870

SOURCES RELEASE DATE

db:CERT/CCid:VU#333628date:2003-09-16T00:00:00
db:BIDid:8628date:2003-09-16T00:00:00
db:JVNDBid:JVNDB-2003-000274date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200309-032date:2003-09-22T00:00:00
db:NVDid:CVE-2003-0693date:2003-09-22T04:00:00