National Vulnerability Database

National Vulnerability Database

National Vulnerability

CVE-2003-0693 Detail


A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

Source:  MITRE      Last Modified:  09/22/2003

Quick Info

CVE Dictionary Entry:
Original release date:
Last revised:


CVSS Severity (version 2.0):
CVSS v2 Base Score:
10.0 HIGH
(AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
Exploitability Subscore:
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Not required to exploit
Impact Type:
Provides administrator access, Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (06/01/2007)

Not vulnerable. This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280. This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch. The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA. This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to

Hyperlink Resource Type Source Name External Source FULLDISC 20030915 new ssh exploit? External Source FULLDISC 20030915 openssh remote exploit External Source FULLDISC 20030916 The lowdown on SSH vulnerability External Source BUGTRAQ 20030916 OpenSSH Buffer Management Bug Advisory External Source REDHAT RHSA-2003:279 External Source BUGTRAQ 20030916 [slackware-security] OpenSSH Security Advisory (SSA:2003-259-01) External Source TRUSTIX 2003-0033 External Source BUGTRAQ 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh) Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:2719 Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:447 External Source SUNALERT 1000620 US Government Resource External Source CERT CA-2003-24 External Source DEBIAN DSA-382 External Source DEBIAN DSA-383 Patch; Third Party Advisory; US Government Resource External Source CERT-VN VU#333628 External Source MANDRAKE MDKSA-2003:090 External Source CONFIRM External Source REDHAT RHSA-2003:280 External Source XF openssh-packet-bo(13191)

References to Check Content

Check System:
Check System:

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*    versions up to (including) 3.7

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 4 change records found - show changes