SSH2 Protocol Vulnerability in Multiple Vendors' Implementations
CVE-2002-1360

Currently unrated

Key Information:

Vendor
Cisco
Vendor
CVE Published:
23 December 2002

Summary

Several SSH2 implementations fail to adequately handle strings containing null characters when their lengths are specified. This oversight can enable remote attackers to initiate denial of service attacks or even execute arbitrary code. The vulnerability stems from the improper usage of null-terminated strings, particularly prevalent in programming languages like C. This issue has been demonstrated using the SSHredder SSH protocol test suite.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.