mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
322 lines
12 KiB
JSON
322 lines
12 KiB
JSON
{
|
|
"id": "CVE-2003-1562",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-12-31T05:00:00.000",
|
|
"lastModified": "2022-12-13T12:15:12.853",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190."
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "Red Hat",
|
|
"comment": "The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which is in maintenance mode.",
|
|
"lastModified": "2008-08-11T00:00:00"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.6
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-362"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BEB67BB-A442-46C2-8BC1-BBEB009AC532"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6E307F1-C765-409C-835C-133026A5179C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA997F5E-29FE-454A-9006-001D732CD4B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "114134F3-BDFD-465D-8317-82F9D6EFA5A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAB55300-F90D-45D3-88BC-5ADCEC366264"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3EC5611-31B5-4253-B99A-E81C202768A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43060323-1B51-45B4-BEB9-0E472896D8EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5441C616-D127-42D9-88AA-0FC9AA16EB03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE60A415-91E3-4819-A252-E86A32EC3018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78135400-BA1A-42AA-BE17-5588442BCF11"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78F2EDC0-3189-4523-882B-9188C852F793"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDEF5203-9D6B-4431-BF0D-C81B1E250AEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2991C07-5486-4590-A74E-46A379DD3339"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4EB9BE06-0A36-4853-ADF4-9C1A1854278A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8FC57F38-6545-497B-B6DA-FCAF51755988"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80C55B73-497D-4A22-9230-A4160BF97344"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B235167-9554-4431-88C5-9472DD36FCDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "580008AC-2667-4708-8F7E-D70416A460EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E05D8E86-EC01-4589-B372-4DEB7845C81F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "764AD252-CA2F-4A87-BCAA-7747E8C410E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "269BB9F7-55E5-4CB3-8429-C37C7132799F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6E6F639-31A0-4026-B6D4-51BA79FB1D20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0211BCE3-0DED-40BA-8A21-1A97B91F71C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AD7BB30-AC79-4153-852C-1053DCF4DE53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F48519C6-0C28-49A5-94C7-EF3AA88E2667"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E188C66-C8F1-4C13-AAFF-7C83B2A884B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9039BE91-AF0A-41E7-8F9F-15375890E120"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08BCB2EA-DF9D-4853-805B-29FA6274E2B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F93417F-2498-4576-9F5D-B59F77D39669"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF3AB42C-B614-4746-99AD-E94140D91BF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "458167E5-9BC2-40BE-AC8A-9761A4F19494"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86ACA0ED-A3D0-48A7-B06F-13709AD23B55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0FEB9262-D05E-4610-9C79-3EDE44AC7C0B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8176879B-1875-4AC9-B15A-2ABCFCD04F88"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FAA26A12-F96A-4025-BBCA-72B7A3B1E60C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A02751E9-2D38-4495-9572-8D84D71D4773"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/320153",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/320302",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/320440",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/7482",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |