First published: Tue Dec 17 2002(Updated: )
Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =12.0s | |
Puppet Cisco IOS | =12.0st | |
Puppet Cisco IOS | =12.1e | |
Puppet Cisco IOS | =12.1ea | |
Puppet Cisco IOS | =12.1t | |
Puppet Cisco IOS | =12.2 | |
Puppet Cisco IOS | =12.2s | |
Puppet Cisco IOS | =12.2t | |
Fissh SSH Client | =1.0a_for_windows | |
Intersoft SecureNetTerm | =5.4.1 | |
netcomposite shellguard SSH | =3.4.6 | |
Pragma Systems SecureShell | =2.0 | |
PuTTY | =0.48 | |
PuTTY | =0.49 | |
PuTTY | =0.53 | |
WinSCP | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1357 is rated as a high severity vulnerability due to its potential to cause denial of service or arbitrary code execution.
To fix CVE-2002-1357, update your affected SSH servers and clients to the latest versions that address this vulnerability.
CVE-2002-1357 affects multiple versions of Cisco IOS as well as SSH clients like PuTTY and WinSCP.
CVE-2002-1357 can be exploited to cause denial of service attacks and potentially allow attackers to execute arbitrary code.
While it is an older vulnerability, CVE-2002-1357 is still relevant as it affects certain legacy systems that may still be in use.