Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote malicious users to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco ios 12.1ea |
||
cisco ios 12.1t |
||
cisco ios 12.2t |
||
cisco ios 12.2 |
||
cisco ios 12.2s |
||
cisco ios 12.0s |
||
cisco ios 12.0st |
||
cisco ios 12.1e |
||
netcomposite shellguard_ssh 3.4.6 |
||
pragma_systems secureshell 2.0 |
||
putty putty 0.53 |
||
winscp winscp 2.0.0 |
||
putty putty 0.48 |
||
putty putty 0.49 |
||
fissh ssh_client 1.0a_for_windows |
||
intersoft securenetterm 5.4.1 |