{"api_version":"1","generated_at":"2026-04-22T19:16:38+00:00","cve":"CVE-2002-1360","urls":{"html":"https://cve.report/CVE-2002-1360","api":"https://cve.report/api/cve/CVE-2002-1360.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2002-1360","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2002-1360"},"summary":{"title":"CVE-2002-1360","description":"Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.","state":"PUBLISHED","assigner":"mitre","published_at":"2002-12-23 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-20","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html","name":"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Neohapsis Archives - VulnWatch - [VulnWatch] R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors - From advisory_at_rapid7.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5797","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5797","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1005813","name":"http://securitytracker.com/id?1005813","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - SSH Communications SSH Client and Server SSH2 Implementation Bugs Allow Only Limited Denial of Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1005812","name":"http://securitytracker.com/id?1005812","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker: F-Secure SSH Client and Server SSH2 Implementation Bugs Allow Only Limited Remote Denial of Service Issues","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.cert.org/advisories/CA-2002-36.html","name":"http://www.cert.org/advisories/CA-2002-36.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"CERT Advisory CA-2002-36 Multiple Vulnerabilities in SSH Implementations","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2002-1360","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-1360","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0st","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.1e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.1ea","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.1t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.2s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.2t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fissh","cpe5":"ssh_client","cpe6":"1.0a_for_windows","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intersoft","cpe5":"securenetterm","cpe6":"5.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netcomposite","cpe5":"shellguard_ssh","cpe6":"3.4.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pragma_systems","cpe5":"secureshell","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"putty","cpe5":"putty","cpe6":"0.48","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"putty","cpe5":"putty","cpe6":"0.49","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"putty","cpe5":"putty","cpe6":"0.53","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"winscp","cpe5":"winscp","cpe6":"2.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T03:19:28.662Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1005812","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1005812"},{"name":"oval:org.mitre.oval:def:5797","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5797"},{"name":"CA-2002-36","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.cert.org/advisories/CA-2002-36.html"},{"name":"20021216 R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors","tags":["mailing-list","x_refsource_VULNWATCH","x_transferred"],"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html"},{"name":"1005813","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1005813"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2002-12-16T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1005812","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1005812"},{"name":"oval:org.mitre.oval:def:5797","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5797"},{"name":"CA-2002-36","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.cert.org/advisories/CA-2002-36.html"},{"name":"20021216 R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors","tags":["mailing-list","x_refsource_VULNWATCH"],"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html"},{"name":"1005813","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1005813"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2002-1360","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1005812","refsource":"SECTRACK","url":"http://securitytracker.com/id?1005812"},{"name":"oval:org.mitre.oval:def:5797","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5797"},{"name":"CA-2002-36","refsource":"CERT","url":"http://www.cert.org/advisories/CA-2002-36.html"},{"name":"20021216 R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors","refsource":"VULNWATCH","url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html"},{"name":"1005813","refsource":"SECTRACK","url":"http://securitytracker.com/id?1005813"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2002-1360","datePublished":"2002-12-17T05:00:00.000Z","dateReserved":"2002-12-14T00:00:00.000Z","dateUpdated":"2024-08-08T03:19:28.662Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2002-12-23 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-20","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*","matchCriteriaId":"2C398460-3F38-4AA7-A4B1-FD8A01588DB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*","matchCriteriaId":"DBEA01D2-B985-4575-AF00-144CE2E3024D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*","matchCriteriaId":"7126E176-D739-4102-8F10-1EEB8C6A219D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*","matchCriteriaId":"E90C0554-1A50-4341-AB07-80AA854673D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*","matchCriteriaId":"752C3C6B-910D-4153-A162-DF255F60306B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*","matchCriteriaId":"E4BC49F2-3DCB-45F0-9030-13F6415EE178"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*","matchCriteriaId":"2D035A35-D53E-4C49-B4E4-F40B85866F27"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*","matchCriteriaId":"84900BB3-B49F-448A-9E04-FE423FBCCC4F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fissh:ssh_client:1.0a_for_windows:*:*:*:*:*:*:*","matchCriteriaId":"0F994C47-04BA-4286-B206-7EC8844E39A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:intersoft:securenetterm:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"06F753D5-DAAD-491E-8158-1C3CE9C30274"},{"vulnerable":true,"criteria":"cpe:2.3:a:netcomposite:shellguard_ssh:3.4.6:*:*:*:*:*:*:*","matchCriteriaId":"B4343CA3-F040-4FBE-A688-048BBB3993F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:pragma_systems:secureshell:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5259078F-BA9C-4EAB-A331-DCA621D187D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*","matchCriteriaId":"1283B462-042C-4857-A700-4179AAE20E2F"},{"vulnerable":true,"criteria":"cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*","matchCriteriaId":"2791C9DD-F55D-4683-85AF-B6814C34EFBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*","matchCriteriaId":"58BA8E70-9491-4D4F-9182-2F48347BF6FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"833B5B6D-9A6B-4F25-81B0-F27D82940F8D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2002","CveId":"1360","Ordinal":"1","Title":"CVE-2002-1360","CVE":"CVE-2002-1360","Year":"2002"},"notes":[{"CveYear":"2002","CveId":"1360","Ordinal":"1","NoteData":"Multiple SSH2 servers and clients do not properly handle strings with null characters in them when the string length is specified by a length field, which could allow remote attackers to cause a denial of service or possibly execute arbitrary code due to interactions with the use of null-terminated strings as implemented using languages such as C, as demonstrated by the SSHredder SSH protocol test suite.","Type":"Description","Title":"CVE-2002-1360"},{"CveYear":"2002","CveId":"1360","Ordinal":"2","NoteData":"2002-12-17","Type":"Other","Title":"Published"},{"CveYear":"2002","CveId":"1360","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}