SSH2 Protocol Vulnerability in Multiple Vendors' Implementations
CVE-2002-1360
Currently unrated
Summary
Several SSH2 implementations fail to adequately handle strings containing null characters when their lengths are specified. This oversight can enable remote attackers to initiate denial of service attacks or even execute arbitrary code. The vulnerability stems from the improper usage of null-terminated strings, particularly prevalent in programming languages like C. This issue has been demonstrated using the SSHredder SSH protocol test suite.
References
Timeline
Vulnerability published
Vulnerability Reserved