{ "id": "CVE-2002-1644", "sourceIdentifier": "cve@mitre.org", "published": "2002-11-25T05:00:00.000", "lastModified": "2017-07-11T01:29:18.320", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2 }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1162A0E9-A994-4F93-8518-22CF7F7B5254" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:ssh2:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "88AA4D9E-2727-4DBD-9A01-B692EA151818" } ] } ] } ], "references": [ { "url": "http://www.kb.cert.org/vuls/id/740619", "source": "cve@mitre.org", "tags": [ "Patch", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/bid/6247", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.ssh.com/company/newsroom/article/286/", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710", "source": "cve@mitre.org" } ] }