CVE Vulnerabilities

CVE-2002-1715

Published: Dec 31, 2002 | Modified: Jul 11, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.

Affected Software

Name Vendor Start Version End Version
Ssh Ssh 1.2.6 1.2.6
Ssh Ssh 1.2.0 1.2.0
Ssh2 Ssh 2.0.13 2.0.13
Ssh2 Ssh 2.1 2.1
Ssh2 Ssh 2.0.3 2.0.3
Ssh2 Ssh 2.0.8 2.0.8
Ssh Ssh 1.2.9 1.2.9
Ssh Ssh 1.2.21 1.2.21
Ssh Ssh 1.2.15 1.2.15
Ssh2 Ssh 2.0.11 2.0.11
Ssh2 Ssh 2.0.9 2.0.9
Ssh2 Ssh 2.2 2.2
Ssh Ssh 1.2.4 1.2.4
Ssh Ssh 1.2.14 1.2.14
Ssh Ssh 1.2.19 1.2.19
Ssh2 Ssh 2.0 2.0
Ssh2 Ssh 2.0.5 2.0.5
Ssh Ssh 1.2.8 1.2.8
Ssh Ssh 1.2.31 1.2.31
Ssh Ssh 1.2.24 1.2.24
Ssh Ssh 1.2.18 1.2.18
Ssh Ssh 1.2.7 1.2.7
Ssh Ssh 1.2.20 1.2.20
Ssh Ssh 1.2.3 1.2.3
Ssh Ssh 1.2.12 1.2.12
Ssh Ssh 1.2.25 1.2.25
Ssh Ssh 1.2.17 1.2.17
Ssh2 Ssh 2.0.6 2.0.6
Ssh2 Ssh 3.0 3.0
Ssh2 Ssh 2.0.4 2.0.4
Ssh Ssh 1.2.30 1.2.30
Ssh Ssh 1.2.1 1.2.1
Ssh Ssh 1.2.26 1.2.26
Ssh Ssh 1.2.27 1.2.27
Ssh Ssh 1.2.16 1.2.16
Ssh2 Ssh 2.4 2.4
Ssh Ssh 1.2.28 1.2.28
Ssh2 Ssh 2.0.1 2.0.1
Ssh Ssh 1.2.29 1.2.29
Ssh Ssh 1.2.11 1.2.11
Ssh Ssh 1.2.5 1.2.5
Ssh2 Ssh 2.0.10 2.0.10
Ssh Ssh 1.2.13 1.2.13
Ssh Ssh 1.2.22 1.2.22
Ssh Ssh 1.2.2 1.2.2
Ssh2 Ssh 2.3 2.3
Ssh Ssh 1.2.23 1.2.23
Ssh2 Ssh 2.5 2.5
Ssh2 Ssh 2.0.12 2.0.12
Ssh Ssh 1.2.10 1.2.10
Ssh2 Ssh 2.0.7 2.0.7
Ssh2 Ssh 2.0.2 2.0.2

References