First published: Tue Dec 17 2002(Updated: )
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.0s | |
Cisco IOS | =12.0st | |
Cisco IOS | =12.1e | |
Cisco IOS | =12.1ea | |
Cisco IOS | =12.1t | |
Cisco IOS | =12.2 | |
Cisco IOS | =12.2s | |
Cisco IOS | =12.2t | |
Fissh Ssh Client | =1.0a_for_windows | |
Intersoft Securenetterm | =5.4.1 | |
Netcomposite Shellguard Ssh | =3.4.6 | |
Pragma Systems Secureshell | =2.0 | |
Putty Putty | =0.48 | |
Putty Putty | =0.49 | |
Putty Putty | =0.53 | |
Winscp Winscp | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.