2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2000-0992" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2000-12-19T05:00:00.000" ,
2024-11-21 21:08:42 +00:00
"lastModified" : "2024-11-20T23:33:45.513" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N" ,
2024-11-21 21:08:42 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-21 21:08:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "316C8534-9CE3-456C-A04E-5D2B789FBE31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA997F5E-29FE-454A-9006-001D732CD4B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41BF66ED-CB08-440E-AC05-A31371B7A380"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0EE3216-D8FF-43F0-9329-6676E2CEC250"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9310E12D-1136-4AD6-9678-8ADCD9EE58C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BBEDF399-58DE-491A-8B51-87E0392FF9C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CBDF2DE8-8559-4BED-80AE-E1420BBF4043"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23EB8421-76BF-47D1-B294-68412D5E4572"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D9560989-5342-4C6B-974F-7D90C467BA39"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "971835AF-E908-4C74-9DE0-167349138DEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "926B57D7-009C-4317-ACFB-98551FADC5B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D0FF07F-E13B-425F-9892-C50B326B2944"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "338EDA76-05D6-48C0-952E-6244A5F206F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F719468E-A218-4EB5-9F8D-7841E84F44C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E4FCD36-0009-4A93-A190-8FDD11C672CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "71727854-1B75-465F-AF8C-DFE6EFF46B40"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/1742" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312" ,
"source" : "cve@mitre.org"
2024-11-21 21:08:42 +00:00
} ,
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/1742" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}