Lucene search

K
certCERTVU:290140
HistoryJun 27, 2002 - 12:00 a.m.

Multiple Cisco products consume excessive CPU resources in response to large SSH packets

2002-06-2700:00:00
www.kb.cert.org
7

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.009 Low

EPSS

Percentile

82.7%

Overview

Multiple Cisco networking products contain a denial-of-service vulnerability.

Description

Multiple Cisco networking products contain a vulnerability that allows large SSH packets to cause excessive consumption of CPU resources. In some circumstances, this resource consumption may cause the affected device to reboot.

This vulnerability is a side effect of a Cisco patch for VU#13877, an SSH packet injection vulnerability. Please note that this patch does not contain the integer overflow vulnerability described in VU#945216. However, according to Cisco’s Security Advisory, this denial-of-service vulnerability may be triggered by attempts to exploit VU#945216.


Impact

Remote attackers may conduct denial-of-service attacks against affected devices.


Solution

Apply a patch

Cisco has published a Security Advisory to address this vulnerability. For information regarding affected devices and obtaining patches, please see

http://www.cisco.com/warp/public/707/SSH-scanning.shtml


Vendor Information

290140

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco Systems Inc. __ Affected

Notified: June 27, 2002 Updated: June 28, 2002

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Cisco has published a Security Advisory to address this vulnerability. For information regarding affected devices and obtaining patches, please see

http://www.cisco.com/warp/public/707/SSH-scanning.shtml

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23290140 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Jeffrey P. Lanza and is based on information provided by Cisco.

Other Information

CVE IDs: CVE-2002-1024
Severity Metric: 21.09 Date Public:

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.009 Low

EPSS

Percentile

82.7%

Related for VU:290140