CVE-2002-1024
Summary
| CVE | CVE-2002-1024 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2002-10-04 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
CompleteAV:N/AC:M/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Cisco | Catos | 5.3\(1a\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(1\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(2\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(3\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(4\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(5a\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(5\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.3\(6\)csx | All | All | All |
| Operating System | Cisco | Catos | 5.4 | All | All | All |
| Operating System | Cisco | Catos | 5.4\(1\) | All | All | All |
| Operating System | Cisco | Catos | 5.4\(2\) | All | All | All |
| Operating System | Cisco | Catos | 5.4\(3\) | All | All | All |
| Operating System | Cisco | Catos | 5.4\(4\) | All | All | All |
| Operating System | Cisco | Catos | 5.5 | All | All | All |
| Operating System | Cisco | Catos | 5.5\(13\) | All | All | All |
| Operating System | Cisco | Catos | 5.5\(1\) | All | All | All |
| Operating System | Cisco | Catos | 5.5\(2\) | All | All | All |
| Operating System | Cisco | Catos | 5.5\(3\) | All | All | All |
| Operating System | Cisco | Catos | 5.5\(4a\) | All | All | All |
| Operating System | Cisco | Catos | 5.5\(4b\) | All | All | All |
| Operating System | Cisco | Catos | 5.5\(4\) | All | All | All |
| Operating System | Cisco | Catos | 6.1\(1a\) | All | All | All |
| Operating System | Cisco | Catos | 6.1\(1b\) | All | All | All |
| Operating System | Cisco | Catos | 6.1\(1c\) | All | All | All |
| Operating System | Cisco | Catos | 6.1\(1\) | All | All | All |
| Operating System | Cisco | Catos | 6.1\(2.13\) | All | All | All |
| Operating System | Cisco | Catos | 6.2\(0.110\) | All | All | All |
| Operating System | Cisco | Catos | 6.2\(0.111\) | All | All | All |
| Operating System | Cisco | Catos | 6.3\(0.7\)pan | All | All | All |
| Operating System | Cisco | Catos | 6.3\(4\) | All | All | All |
| Operating System | Cisco | Catos | 7.1 | All | All | All |
| Operating System | Cisco | Catos | 7.1\(2\) | All | All | All |
| Application | Cisco | Css11000 Content Services Switch | All | All | All | All |
| Operating System | Cisco | Ios | 12.0s | All | All | All |
| Operating System | Cisco | Ios | 12.0sp | All | All | All |
| Operating System | Cisco | Ios | 12.0st | All | All | All |
| Operating System | Cisco | Ios | 12.0xb | All | All | All |
| Operating System | Cisco | Ios | 12.0xm | All | All | All |
| Operating System | Cisco | Ios | 12.0xv | All | All | All |
| Operating System | Cisco | Ios | 12.1e | All | All | All |
| Operating System | Cisco | Ios | 12.1ec | All | All | All |
| Operating System | Cisco | Ios | 12.1t | All | All | All |
| Operating System | Cisco | Ios | 12.1xb | All | All | All |
| Operating System | Cisco | Ios | 12.1xc | All | All | All |
| Operating System | Cisco | Ios | 12.1xf | All | All | All |
| Operating System | Cisco | Ios | 12.1xg | All | All | All |
| Operating System | Cisco | Ios | 12.1xh | All | All | All |
| Operating System | Cisco | Ios | 12.1xi | All | All | All |
| Operating System | Cisco | Ios | 12.1xj | All | All | All |
| Operating System | Cisco | Ios | 12.1xl | All | All | All |
| Operating System | Cisco | Ios | 12.1xm | All | All | All |
| Operating System | Cisco | Ios | 12.1xp | All | All | All |
| Operating System | Cisco | Ios | 12.1xq | All | All | All |
| Operating System | Cisco | Ios | 12.1xt | All | All | All |
| Operating System | Cisco | Ios | 12.1xu | All | All | All |
| Operating System | Cisco | Ios | 12.1yb | All | All | All |
| Operating System | Cisco | Ios | 12.1yc | All | All | All |
| Operating System | Cisco | Ios | 12.1yd | All | All | All |
| Operating System | Cisco | Ios | 12.1ye | All | All | All |
| Operating System | Cisco | Ios | 12.1yf | All | All | All |
| Operating System | Cisco | Ios | 12.1yi | All | All | All |
| Operating System | Cisco | Ios | 12.1\(1\)ex | All | All | All |
| Operating System | Cisco | Ios | 12.1\(5c\)ex | All | All | All |
| Operating System | Cisco | Ios | 12.1\(8a\)ex | All | All | All |
| Operating System | Cisco | Ios | 12.1\(9\)ex | All | All | All |
| Operating System | Cisco | Ios | 12.2 | All | All | All |
| Operating System | Cisco | Ios | 12.2b | All | All | All |
| Operating System | Cisco | Ios | 12.2bc | All | All | All |
| Operating System | Cisco | Ios | 12.2da | All | All | All |
| Operating System | Cisco | Ios | 12.2dd | All | All | All |
| Operating System | Cisco | Ios | 12.2s | All | All | All |
| Operating System | Cisco | Ios | 12.2t | All | All | All |
| Operating System | Cisco | Ios | 12.2xa | All | All | All |
| Operating System | Cisco | Ios | 12.2xb | All | All | All |
| Operating System | Cisco | Ios | 12.2xd | All | All | All |
| Operating System | Cisco | Ios | 12.2xe | All | All | All |
| Operating System | Cisco | Ios | 12.2xf | All | All | All |
| Operating System | Cisco | Ios | 12.2xg | All | All | All |
| Operating System | Cisco | Ios | 12.2xh | All | All | All |
| Operating System | Cisco | Ios | 12.2xi | All | All | All |
| Operating System | Cisco | Ios | 12.2xj | All | All | All |
| Operating System | Cisco | Ios | 12.2xk | All | All | All |
| Operating System | Cisco | Ios | 12.2xl | All | All | All |
| Operating System | Cisco | Ios | 12.2xm | All | All | All |
| Operating System | Cisco | Ios | 12.2xn | All | All | All |
| Operating System | Cisco | Ios | 12.2xq | All | All | All |
| Operating System | Cisco | Ios | 12.2xr | All | All | All |
| Operating System | Cisco | Ios | 12.2xs | All | All | All |
| Operating System | Cisco | Ios | 12.2xt | All | All | All |
| Operating System | Cisco | Ios | 12.2xw | All | All | All |
| Operating System | Cisco | Ios | 12.2ya | All | All | All |
| Operating System | Cisco | Ios | 12.2yb | All | All | All |
| Operating System | Cisco | Ios | 12.2yc | All | All | All |
| Operating System | Cisco | Ios | 12.2yd | All | All | All |
| Operating System | Cisco | Ios | 12.2yf | All | All | All |
| Operating System | Cisco | Ios | 12.2yg | All | All | All |
| Operating System | Cisco | Ios | 12.2yh | All | All | All |
| Operating System | Cisco | Pix Firewall Software | 5.2 | All | All | All |
| Operating System | Cisco | Pix Firewall Software | 5.3 | All | All | All |
| Operating System | Cisco | Pix Firewall Software | 6.0 | All | All | All |
| Operating System | Cisco | Pix Firewall Software | 6.1 | All | All | All |
| Operating System | Cisco | Pix Firewall Software | 6.2 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco SSH Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| Cisco - Security Advisory: Scanning for SSH Can Cause a Crash | af854a3a-2127-422b-91ae-364da2661108 | www.cisco.com | |
| ISS X-Force Database: cisco-ssh-scan-dos (9437): Multiple Cisco device SSH scanning denial of service | af854a3a-2127-422b-91ae-364da2661108 | www.iss.net | Patch, Vendor Advisory |
| CERT/CC Vulnerability Note VU#290140 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.