{"id":"DEBIAN-CVE-2003-0787","details":"The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.","modified":"2026-04-28T20:03:50.499032Z","published":"2003-11-17T05:00:00Z","upstream":["CVE-2003-0787"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2003-0787"}],"affected":[{"package":{"name":"openssh","ecosystem":"Debian:11","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.7.1p2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0787.json"}},{"package":{"name":"openssh","ecosystem":"Debian:12","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.7.1p2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0787.json"}},{"package":{"name":"openssh","ecosystem":"Debian:13","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.7.1p2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0787.json"}},{"package":{"name":"openssh","ecosystem":"Debian:14","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.7.1p2"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0787.json"}}],"schema_version":"1.7.5"}