10

CVE-2002-1360

Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Version12.0s
CiscoIos Version12.0st
CiscoIos Version12.1e
CiscoIos Version12.1ea
CiscoIos Version12.1t
CiscoIos Version12.2
CiscoIos Version12.2s
CiscoIos Version12.2t
FisshSsh Client Version1.0a_for_windows
IntersoftSecurenetterm Version5.4.1
NetcompositeShellguard Ssh Version3.4.6
Pragma SystemsSecureshell Version2.0
PuTTYPuTTY Version0.48
PuTTYPuTTY Version0.49
PuTTYPuTTY Version0.53
WinSCPWinSCP Version2.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.13% 0.882
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.