First published: Tue Dec 17 2002(Updated: )
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =12.0s | |
Puppet Cisco IOS | =12.0st | |
Puppet Cisco IOS | =12.1e | |
Puppet Cisco IOS | =12.1ea | |
Puppet Cisco IOS | =12.1t | |
Puppet Cisco IOS | =12.2 | |
Puppet Cisco IOS | =12.2s | |
Puppet Cisco IOS | =12.2t | |
Fissh SSH Client | =1.0a_for_windows | |
Intersoft SecureNetTerm | =5.4.1 | |
netcomposite shellguard SSH | =3.4.6 | |
Pragma Systems SecureShell | =2.0 | |
PuTTY | =0.48 | |
PuTTY | =0.49 | |
PuTTY | =0.53 | |
WinSCP | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1359 has a severity rating that can lead to denial of service and potential arbitrary code execution.
Users should update their SSH clients and servers to the latest versions that patch this vulnerability.
CVE-2002-1359 affects several versions of Cisco IOS, PuTTY, WinSCP, and other SSH clients and servers.
CVE-2002-1359 allows attackers to perform buffer overflow attacks through large packets or fields.
While CVE-2002-1359 is an older vulnerability, systems running outdated software versions may still be at risk.