CVE Vulnerabilities

CVE-2002-1715

Published: Dec 31, 2002 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

Affected Software

NameVendorStart VersionEnd Version
SshSsh1.2.0 (including)1.2.0 (including)
SshSsh1.2.1 (including)1.2.1 (including)
SshSsh1.2.2 (including)1.2.2 (including)
SshSsh1.2.3 (including)1.2.3 (including)
SshSsh1.2.4 (including)1.2.4 (including)
SshSsh1.2.5 (including)1.2.5 (including)
SshSsh1.2.6 (including)1.2.6 (including)
SshSsh1.2.7 (including)1.2.7 (including)
SshSsh1.2.8 (including)1.2.8 (including)
SshSsh1.2.9 (including)1.2.9 (including)
SshSsh1.2.10 (including)1.2.10 (including)
SshSsh1.2.11 (including)1.2.11 (including)
SshSsh1.2.12 (including)1.2.12 (including)
SshSsh1.2.13 (including)1.2.13 (including)
SshSsh1.2.14 (including)1.2.14 (including)
SshSsh1.2.15 (including)1.2.15 (including)
SshSsh1.2.16 (including)1.2.16 (including)
SshSsh1.2.17 (including)1.2.17 (including)
SshSsh1.2.18 (including)1.2.18 (including)
SshSsh1.2.19 (including)1.2.19 (including)
SshSsh1.2.20 (including)1.2.20 (including)
SshSsh1.2.21 (including)1.2.21 (including)
SshSsh1.2.22 (including)1.2.22 (including)
SshSsh1.2.23 (including)1.2.23 (including)
SshSsh1.2.24 (including)1.2.24 (including)
SshSsh1.2.25 (including)1.2.25 (including)
SshSsh1.2.26 (including)1.2.26 (including)
SshSsh1.2.27 (including)1.2.27 (including)
SshSsh1.2.28 (including)1.2.28 (including)
SshSsh1.2.29 (including)1.2.29 (including)
SshSsh1.2.30 (including)1.2.30 (including)
SshSsh1.2.31 (including)1.2.31 (including)
Ssh2Ssh2.0 (including)2.0 (including)
Ssh2Ssh2.0.1 (including)2.0.1 (including)
Ssh2Ssh2.0.2 (including)2.0.2 (including)
Ssh2Ssh2.0.3 (including)2.0.3 (including)
Ssh2Ssh2.0.4 (including)2.0.4 (including)
Ssh2Ssh2.0.5 (including)2.0.5 (including)
Ssh2Ssh2.0.6 (including)2.0.6 (including)
Ssh2Ssh2.0.7 (including)2.0.7 (including)
Ssh2Ssh2.0.8 (including)2.0.8 (including)
Ssh2Ssh2.0.9 (including)2.0.9 (including)
Ssh2Ssh2.0.10 (including)2.0.10 (including)
Ssh2Ssh2.0.11 (including)2.0.11 (including)
Ssh2Ssh2.0.12 (including)2.0.12 (including)
Ssh2Ssh2.0.13 (including)2.0.13 (including)
Ssh2Ssh2.1 (including)2.1 (including)
Ssh2Ssh2.2 (including)2.2 (including)
Ssh2Ssh2.3 (including)2.3 (including)
Ssh2Ssh2.4 (including)2.4 (including)
Ssh2Ssh2.5 (including)2.5 (including)
Ssh2Ssh3.0 (including)3.0 (including)

References