Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2002-1359

Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.804
EPSS Ranking 99.1%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2002-1359
  • Fissh » Ssh Client » Version: 1.0a_for_windows
    cpe:2.3:a:fissh:ssh_client:1.0a_for_windows
  • Intersoft » Securenetterm » Version: 5.4.1
    cpe:2.3:a:intersoft:securenetterm:5.4.1
  • Netcomposite » Shellguard Ssh » Version: 3.4.6
    cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6
  • Pragma Systems » Secureshell » Version: 2.0
    cpe:2.3:a:pragma_systems:secureshell:2.0
  • Putty » Putty » Version: 0.48
    cpe:2.3:a:putty:putty:0.48
  • Putty » Putty » Version: 0.49
    cpe:2.3:a:putty:putty:0.49
  • Putty » Putty » Version: 0.53
    cpe:2.3:a:putty:putty:0.53
  • Winscp » Winscp » Version: 2.0.0
    cpe:2.3:a:winscp:winscp:2.0.0
  • Cisco » Ios » Version: 12.0s
    cpe:2.3:o:cisco:ios:12.0s
  • Cisco » Ios » Version: 12.0st
    cpe:2.3:o:cisco:ios:12.0st
  • Cisco » Ios » Version: 12.1e
    cpe:2.3:o:cisco:ios:12.1e
  • Cisco » Ios » Version: 12.1ea
    cpe:2.3:o:cisco:ios:12.1ea
  • Cisco » Ios » Version: 12.1t
    cpe:2.3:o:cisco:ios:12.1t
  • Cisco » Ios » Version: 12.2
    cpe:2.3:o:cisco:ios:12.2
  • Cisco » Ios » Version: 12.2s
    cpe:2.3:o:cisco:ios:12.2s
  • Cisco » Ios » Version: 12.2t
    cpe:2.3:o:cisco:ios:12.2t


Contact Us

Shodan ® - All rights reserved