CVE-2002-1359

Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*
OR cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:*
cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:*
cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2002-12-23 05:00

Updated : 2023-12-10 10:17


NVD link : CVE-2002-1359

Mitre link : CVE-2002-1359

CVE.ORG link : CVE-2002-1359


JSON object : View

Products Affected

cisco

  • ios

putty

  • putty

winscp

  • winscp

pragma_systems

  • secureshell

netcomposite

  • shellguard_ssh

intersoft

  • securenetterm

fissh

  • ssh_client
CWE
CWE-20

Improper Input Validation