First published: Tue Dec 17 2002(Updated: )
Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =12.0s | |
Puppet Cisco IOS | =12.0st | |
Puppet Cisco IOS | =12.1e | |
Puppet Cisco IOS | =12.1ea | |
Puppet Cisco IOS | =12.1t | |
Puppet Cisco IOS | =12.2 | |
Puppet Cisco IOS | =12.2s | |
Puppet Cisco IOS | =12.2t | |
Fissh SSH Client | =1.0a_for_windows | |
Intersoft SecureNetTerm | =5.4.1 | |
netcomposite shellguard SSH | =3.4.6 | |
Pragma Systems SecureShell | =2.0 | |
PuTTY | =0.48 | |
PuTTY | =0.49 | |
PuTTY | =0.53 | |
WinSCP | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2002-1360 ranges from a denial of service to the potential execution of arbitrary code.
To fix CVE-2002-1360, update your SSH server or client to a patched version that mitigates the vulnerability.
CVE-2002-1360 affects multiple versions of Cisco IOS and several SSH clients, including PuTTY and WinSCP.
CVE-2002-1360 is a vulnerability that involves improper handling of null characters in strings.
Remote attackers can exploit CVE-2002-1360 to potentially disrupt service or execute arbitrary code on vulnerable systems.