| Summary | Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite. |
|---|---|
| Publication Date | Dec. 23, 2002, 2 p.m. |
| Registration Date | Jan. 29, 2021, 6:04 p.m. |
| Last Update | Oct. 11, 2017, 10:29 a.m. |
| CVSS2.0 : HIGH | |
| Score | 10.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | はい |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:* | |||||