National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2003-0695 Detail

Description

Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.

Source:  MITRE      Last Modified:  10/06/2003

Quick Info

CVE Dictionary Entry:
CVE-2003-0695
Original release date:
10/06/2003
Last revised:
10/17/2016
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
7.5 HIGH
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Provides unauthorized access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (06/01/2007)

Not vulnerable. This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280. This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch. The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA. This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000741 External Source CONECTIVA CLA-2003:741
http://marc.info/?l=bugtraq&m=106373546332230&w=2 External Source REDHAT RHSA-2003:279
http://marc.info/?l=bugtraq&m=106381396120332&w=2 External Source TRUSTIX 2003-0033
http://marc.info/?l=bugtraq&m=106381409220492&w=2 External Source BUGTRAQ 20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)
http://marc.info/?l=bugtraq&m=106382542403716&w=2 External Source BUGTRAQ 20030917 [slackware-security] OpenSSH updated again (SSA:2003-260-01)
http://marc.info/?l=openbsd-security-announce&m=106375582924840 External Source MISC http://marc.info/?l=openbsd-security-announce&m=106375582924840
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:452 Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:452
http://www.debian.org/security/2003/dsa-382 External Source DEBIAN DSA-382
http://www.debian.org/security/2003/dsa-383 Patch; Vendor Advisory External Source DEBIAN DSA-383
http://www.mandriva.com/security/advisories?name=MDKSA-2003:090 External Source MANDRAKE MDKSA-2003:090
http://www.openssh.com/txt/buffer.adv External Source CONFIRM http://www.openssh.com/txt/buffer.adv
http://www.redhat.com/support/errata/RHSA-2003-280.html Patch; Vendor Advisory External Source REDHAT RHSA-2003:280

References to Check Content

Identifier:
oval:org.mitre.oval:def:452
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:452

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes