Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2002-1360


Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.


Published

2002-12-23T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 10.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios 12.0s Yes
Operating System cisco ios 12.0st Yes
Operating System cisco ios 12.1e Yes
Operating System cisco ios 12.1ea Yes
Operating System cisco ios 12.1t Yes
Operating System cisco ios 12.2 Yes
Operating System cisco ios 12.2s Yes
Operating System cisco ios 12.2t Yes
Application fissh ssh_client 1.0a_for_windows Yes
Application intersoft securenetterm 5.4.1 Yes
Application netcomposite shellguard_ssh 3.4.6 Yes
Application pragma_systems secureshell 2.0 Yes
Application putty putty 0.48 Yes
Application putty putty 0.49 Yes
Application putty putty 0.53 Yes
Application winscp winscp 2.0.0 Yes

References