Vulnerability Details : CVE-2002-1357
Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2002-1357
Probability of exploitation activity in the next 30 days: 19.30%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-1357
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2002-1357
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2002-1357
-
http://www.securityfocus.com/bid/6405
-
http://www.kb.cert.org/vuls/id/389665
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10868
- http://securitytracker.com/id?1005813
- http://securitytracker.com/id?1005812
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html
-
http://www.cert.org/advisories/CA-2002-36.html
Third Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5849
Products affected by CVE-2002-1357
- cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*
- cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
- cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
- cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:*
- cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*