Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://securitytracker.com/id?1005812 | vdb entry |
http://www.cert.org/advisories/CA-2002-36.html | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10870 | vdb entry |
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html | mailing list vendor advisory |
http://www.securityfocus.com/bid/6407 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5848 | vdb entry signature |
http://securitytracker.com/id?1005813 | vdb entry |