Show plain JSON{"id": "CVE-2002-1644", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2002-11-25T05:00:00.000", "references": [{"url": "http://www.kb.cert.org/vuls/id/740619", "tags": ["Patch", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/6247", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.ssh.com/company/newsroom/article/286/", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10710", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "SSH Secure Shell for Servers and SSH Secure Shell for Workstations 2.0.13 through 3.2.1, when running without a PTY, does not call setsid to remove the child process from the process group of the parent process, which allows attackers to gain certain privileges."}], "lastModified": "2017-07-11T01:29:18.320", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397"}, {"criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23"}, {"criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6"}, {"criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E"}, {"criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588"}, {"criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1162A0E9-A994-4F93-8518-22CF7F7B5254"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48B16537-6D32-49BE-BA9C-34B38D99582F"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43D3D960-088A-4A25-B685-7A869F4400DB"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "240D6450-1A4E-4672-BF68-3B3E6D468ECB"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65D36365-3343-49E4-907F-F0F05E4615BA"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19965F3E-3858-430D-A919-AECC81DED356"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22F95328-DC68-41D2-A52C-A9809D62A100"}, {"criteria": "cpe:2.3:a:ssh:ssh2:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88AA4D9E-2727-4DBD-9A01-B692EA151818"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}