CVE-2002-0640

CVSS 10.0 - HIGH
Description

Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).

Affected Products
26
Vendor Product Version
openbsd openssh 1.2.2
openbsd openssh 1.2.3
openbsd openssh 2.1
openbsd openssh 2.1.1
openbsd openssh 2.2
openbsd openssh 2.3
openbsd openssh 2.5
openbsd openssh 2.5.1
openbsd openssh 2.5.2
openbsd openssh 2.9
openbsd openssh 2.9.9
openbsd openssh 2.9p1
openbsd openssh 2.9p2
openbsd openssh 3.0
openbsd openssh 3.0.1
openbsd openssh 3.0.1p1
openbsd openssh 3.0.2
openbsd openssh 3.0.2p1
openbsd openssh 3.0p1
openbsd openssh 3.1
openbsd openssh 3.1p1
openbsd openssh 3.2
openbsd openssh 3.2.2p1
openbsd openssh 3.2.3p1
openbsd openssh 3.3
openbsd openssh 3.3p1
Weakness Types
NVD-CWE-Other
CVE Information
CVE ID:
CVE-2002-0640
Published:
2002-07-03
Modified:
2026-04-16
CVSS Score:
10.0
Severity:
HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Vendors
openbsd
Quick Actions
CVSS Severity Scale
0.0 - 3.9 LOW
4.0 - 6.9 MEDIUM
7.0 - 8.9 HIGH
9.0 - 10.0 CRITICAL