Executive Summary

Informations
Name CVE-2002-1360 First vendor Publication 2002-12-23
Vendor Cve Last vendor Modification 2017-10-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1360

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5797
 
Oval ID: oval:org.mitre.oval:def:5797
Title: Multiple Vendors SSH2 "null characters in strings" Vulnerability
Description: Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.
Family: ios Class: vulnerability
Reference(s): CVE-2002-1360
Version: 1
Platform(s): Cisco IOS
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 1
Application 1
Application 3
Application 1
Os 8

OpenVAS Exploits

Date Description
2005-11-03 Name : SSH Multiple Vulns
File : nvt/ssh_multivulns_16122002.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
8045 SSH2 Server/Client Null Character String Arbitrary Command Execution

A remote overflow exists in SSH2. The SSH2 software fails to handle strings with null characters in the length field, resulting in a buffer overflow. By sending a specially-crafted packet with a string field containing null characters during SSH key exchange and initialization, a remote attacker could overflow a buffer and crash or execute arbitrary code on the system with privileges of the SSH process, resulting in a loss of confidentiality, integrity or availability.

Nessus® Vulnerability Scanner

Date Description
2010-09-01 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20021219-ssh-packethttp.nasl - Type : ACT_GATHER_INFO
2003-03-14 Name : The remote device is missing a vendor-supplied security patch.
File : CSCdz60229.nasl - Type : ACT_GATHER_INFO
2002-12-20 Name : It may be possible to crash the SSH server on the remote host.
File : ssh_multivulns_16122002.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CERT http://www.cert.org/advisories/CA-2002-36.html
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1005812
http://securitytracker.com/id?1005813
VULNWATCH http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2020-05-23 00:15:08
  • Multiple Updates
2017-10-11 09:23:15
  • Multiple Updates
2016-04-26 12:17:49
  • Multiple Updates
2014-02-17 10:25:18
  • Multiple Updates
2013-05-11 12:12:34
  • Multiple Updates