CVE Vulnerabilities

CVE-2000-0143

Published: Feb 11, 2000 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.

Affected Software

NameVendorStart VersionEnd Version
OpensshOpenbsd*1.2.1 (including)
OpensshOpenbsd1.2 (including)1.2 (including)
SshSsh1.2.0 (including)1.2.0 (including)
SshSsh1.2.1 (including)1.2.1 (including)
SshSsh1.2.2 (including)1.2.2 (including)
SshSsh1.2.3 (including)1.2.3 (including)
SshSsh1.2.4 (including)1.2.4 (including)
SshSsh1.2.5 (including)1.2.5 (including)
SshSsh1.2.6 (including)1.2.6 (including)
SshSsh1.2.7 (including)1.2.7 (including)
SshSsh1.2.8 (including)1.2.8 (including)
SshSsh1.2.9 (including)1.2.9 (including)
SshSsh1.2.10 (including)1.2.10 (including)
SshSsh1.2.11 (including)1.2.11 (including)
SshSsh1.2.12 (including)1.2.12 (including)
SshSsh1.2.13 (including)1.2.13 (including)
SshSsh1.2.14 (including)1.2.14 (including)
SshSsh1.2.15 (including)1.2.15 (including)
SshSsh1.2.16 (including)1.2.16 (including)
SshSsh1.2.17 (including)1.2.17 (including)
SshSsh1.2.18 (including)1.2.18 (including)
SshSsh1.2.19 (including)1.2.19 (including)
SshSsh1.2.20 (including)1.2.20 (including)
SshSsh1.2.21 (including)1.2.21 (including)
SshSsh1.2.22 (including)1.2.22 (including)
SshSsh1.2.23 (including)1.2.23 (including)
SshSsh1.2.24 (including)1.2.24 (including)
SshSsh1.2.25 (including)1.2.25 (including)
SshSsh1.2.26 (including)1.2.26 (including)
SshSsh1.2.27 (including)1.2.27 (including)

References