Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2003-0693

Опубликовано: 15 сент. 2003
Источник: redhat
EPSS Средний

Описание

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

Отчет

Not vulnerable. This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280. This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch. The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA. This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.

Дополнительная информация

Статус:

Critical

EPSS

Процентиль: 96%
0.21644
Средний

Связанные уязвимости

ubuntu
почти 22 года назад

Описание отсутствует

nvd
почти 22 года назад

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

debian
почти 22 года назад

A "buffer management error" in buffer_append_space of buffer.c for Ope ...

github
больше 3 лет назад

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.

fstec
почти 22 года назад

Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 96%
0.21644
Средний