Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-1359 | First vendor Publication | 2002-12-23 |
Vendor | Cve | Last vendor Modification | 2017-10-11 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1359 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5848 | |||
Oval ID: | oval:org.mitre.oval:def:5848 | ||
Title: | Multiple Vendors SSH2 "buffer overflow" Vulnerability | ||
Description: | Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite. | ||
Family: | ios | Class: | vulnerability |
Reference(s): | CVE-2002-1359 | Version: | 1 |
Platform(s): | Cisco IOS | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 3 | |
Application | 1 | |
Os |
| 8 |
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : SSH Multiple Vulns File : nvt/ssh_multivulns_16122002.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
8044 | Multiple Vendor SSH2 Server/Client Large Field Overflows Multiple buffer overflows exist in multiple SSH implementations. Both servers and clients fail to validate large packets or fields resulting in a buffer overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Putty Server key exchange buffer overflow attempt RuleID : 10010 - Revision : 8 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20021219-ssh-packethttp.nasl - Type : ACT_GATHER_INFO |
2003-03-14 | Name : The remote device is missing a vendor-supplied security patch. File : CSCdz60229.nasl - Type : ACT_GATHER_INFO |
2002-12-20 | Name : It may be possible to crash the SSH server on the remote host. File : ssh_multivulns_16122002.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2020-05-23 13:16:43 |
|
2020-05-23 00:15:08 |
|
2017-10-11 09:23:15 |
|
2017-07-11 12:01:11 |
|
2016-04-26 12:17:49 |
|
2016-03-11 13:24:20 |
|
2016-03-11 09:23:58 |
|
2014-02-17 10:25:18 |
|
2014-01-19 21:21:49 |
|
2013-05-11 12:12:34 |
|