First published: Tue Dec 17 2002(Updated: )
Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =12.0s | |
Puppet Cisco IOS | =12.0st | |
Puppet Cisco IOS | =12.1e | |
Puppet Cisco IOS | =12.1ea | |
Puppet Cisco IOS | =12.1t | |
Puppet Cisco IOS | =12.2 | |
Puppet Cisco IOS | =12.2s | |
Puppet Cisco IOS | =12.2t | |
Fissh SSH Client | =1.0a_for_windows | |
Intersoft SecureNetTerm | =5.4.1 | |
netcomposite shellguard SSH | =3.4.6 | |
Pragma Systems SecureShell | =2.0 | |
PuTTY | =0.48 | |
PuTTY | =0.49 | |
PuTTY | =0.53 | |
WinSCP | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1358 has a severity rating that indicates it can cause a denial of service and potentially lead to arbitrary code execution.
To fix CVE-2002-1358, you should update your SSH clients and servers to the latest versions that include patches for this vulnerability.
CVE-2002-1358 affects various versions of Cisco IOS and other SSH clients like PuTTY and WinSCP among others.
Yes, CVE-2002-1358 can be exploited remotely by attackers, allowing them to potentially disrupt services or execute code.
While the recommended action is to apply updates, temporarily restricting access to affected services may serve as a workaround for CVE-2002-1358.