Buffer Overflow Vulnerability in Multiple SSH2 Implementations
CVE-2002-1359
Currently unrated
Summary
Multiple implementations of SSH2 servers and clients exhibit improper handling of large packets and fields. This oversight may allow remote attackers to exploit buffer overflow vulnerabilities, potentially resulting in denial of service scenarios or arbitrary code execution. The risk is illustrated by the SSHredder SSH protocol test suite, which highlights these weaknesses across various SSH2 implementations from multiple vendors.
References
EPSS Score
80% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved