- EPSS 18.47%
- Published 23.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH...
- EPSS 4.13%
- Published 23.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
- EPSS 87%
- Published 23.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH...
- EPSS 4.13%
- Published 23.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code du...