Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2002-1715


SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.


Published

2002-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.2 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ssh ssh 1.2.0 Yes
Application ssh ssh 1.2.1 Yes
Application ssh ssh 1.2.2 Yes
Application ssh ssh 1.2.3 Yes
Application ssh ssh 1.2.4 Yes
Application ssh ssh 1.2.5 Yes
Application ssh ssh 1.2.6 Yes
Application ssh ssh 1.2.7 Yes
Application ssh ssh 1.2.8 Yes
Application ssh ssh 1.2.9 Yes
Application ssh ssh 1.2.10 Yes
Application ssh ssh 1.2.11 Yes
Application ssh ssh 1.2.12 Yes
Application ssh ssh 1.2.13 Yes
Application ssh ssh 1.2.14 Yes
Application ssh ssh 1.2.15 Yes
Application ssh ssh 1.2.16 Yes
Application ssh ssh 1.2.17 Yes
Application ssh ssh 1.2.18 Yes
Application ssh ssh 1.2.19 Yes
Application ssh ssh 1.2.20 Yes
Application ssh ssh 1.2.21 Yes
Application ssh ssh 1.2.22 Yes
Application ssh ssh 1.2.23 Yes
Application ssh ssh 1.2.24 Yes
Application ssh ssh 1.2.25 Yes
Application ssh ssh 1.2.26 Yes
Application ssh ssh 1.2.27 Yes
Application ssh ssh 1.2.28 Yes
Application ssh ssh 1.2.29 Yes
Application ssh ssh 1.2.30 Yes
Application ssh ssh 1.2.31 Yes
Application ssh ssh2 2.0 Yes
Application ssh ssh2 2.0.1 Yes
Application ssh ssh2 2.0.2 Yes
Application ssh ssh2 2.0.3 Yes
Application ssh ssh2 2.0.4 Yes
Application ssh ssh2 2.0.5 Yes
Application ssh ssh2 2.0.6 Yes
Application ssh ssh2 2.0.7 Yes
Application ssh ssh2 2.0.8 Yes
Application ssh ssh2 2.0.9 Yes
Application ssh ssh2 2.0.10 Yes
Application ssh ssh2 2.0.11 Yes
Application ssh ssh2 2.0.12 Yes
Application ssh ssh2 2.0.13 Yes
Application ssh ssh2 2.1 Yes
Application ssh ssh2 2.2 Yes
Application ssh ssh2 2.3 Yes
Application ssh ssh2 2.4 Yes
Application ssh ssh2 2.5 Yes
Application ssh ssh2 3.0 Yes

References