ID

VAR-200210-0102


CVE

CVE-2002-1024


TITLE

Multiple Cisco products consume excessive CPU resources in response to large SSH packets

Trust: 0.8

sources: CERT/CC: VU#290140

DESCRIPTION

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user. As a result, the user could transmit data, meant to be encrypted, as plaintext. IOS is an Internet operating system distributed by CISCO and used on CISCO routers. When processing very large packets, the SSH process consumes most of the CPU instruction cycles, causing it to stop responding to normal communication, resulting in a denial of service. In some cases, it may cause the CISCO equipment to restart. The problem lies in deattack.c, because a 16-bit unsigned variable is mistakenly used as a 32-bit variable in the detect_attack() function, resulting in a table index overflow problem and a denial of service attack. For details, please refer to SSH1 daemon crc32 compensation attack detection security vulnerability ( http://security.nsfocus.com/showQuery.asp?bugID=1262 )

Trust: 7.02

sources: NVD: CVE-2002-1024 // CERT/CC: VU#290140 // CERT/CC: VU#13877 // CERT/CC: VU#25309 // CERT/CC: VU#945216 // CERT/CC: VU#566640 // CERT/CC: VU#651994 // CERT/CC: VU#315308 // JVNDB: JVNDB-2002-000146 // BID: 2405 // VULHUB: VHN-5413

AFFECTED PRODUCTS

vendor:ssh securitymodel: - scope: - version: -

Trust: 3.2

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.8

vendor:ciscomodel: - scope: - version: -

Trust: 1.6

vendor:opensshmodel: - scope: - version: -

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.1\(1c\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.3\(4\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.1\(2.13\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.2\(0.110\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:7.1\(2\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.1\(1a\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.3\(0.7\)pan

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.1\(1b\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.2\(0.111\)

Trust: 1.6

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xt

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.4\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xr

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(3\)

Trust: 1.0

vendor:ciscomodel:css11000 content services switchscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2dd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xa

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(5\)csx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xi

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.4\(2\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yd

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(4\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yd

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(5a\)csx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yb

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(4b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ec

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xf

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.4\(3\)

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xl

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(13\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(1\)ex

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(1\)csx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0st

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(5c\)ex

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yc

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(2\)csx

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(4a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0xv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xl

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(4\)csx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(8a\)ex

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xj

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2da

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xg

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(9\)ex

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ye

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(3\)csx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0sp

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.5\(2\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yi

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.4\(4\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yf

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(6\)csx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yb

Trust: 1.0

vendor:ciscomodel:catosscope:eqversion:5.3\(1a\)csx

Trust: 1.0

vendor:core sdimodel: - scope: - version: -

Trust: 0.8

vendor:debianmodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:smoothwallmodel: - scope: - version: -

Trust: 0.8

vendor:susemodel: - scope: - version: -

Trust: 0.8

vendor:holger lammmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:5.1

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:5.2

Trust: 0.8

vendor:holgermodel:lamm pgp4pinescope:eqversion:1.75.6

Trust: 0.3

sources: CERT/CC: VU#290140 // CERT/CC: VU#13877 // CERT/CC: VU#25309 // CERT/CC: VU#945216 // CERT/CC: VU#566640 // CERT/CC: VU#315308 // BID: 2405 // JVNDB: JVNDB-2002-000146 // CNNVD: CNNVD-200210-194 // NVD: CVE-2002-1024

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-1024
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#290140
value: 21.09

Trust: 0.8

CARNEGIE MELLON: VU#13877
value: 6.84

Trust: 0.8

CARNEGIE MELLON: VU#25309
value: 0.39

Trust: 0.8

CARNEGIE MELLON: VU#945216
value: 99.00

Trust: 0.8

CARNEGIE MELLON: VU#566640
value: 0.68

Trust: 0.8

CARNEGIE MELLON: VU#651994
value: 1.50

Trust: 0.8

CARNEGIE MELLON: VU#315308
value: 2.06

Trust: 0.8

NVD: CVE-2002-1024
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200210-194
value: HIGH

Trust: 0.6

VULHUB: VHN-5413
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-1024
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2002-1024
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-5413
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#290140 // CERT/CC: VU#13877 // CERT/CC: VU#25309 // CERT/CC: VU#945216 // CERT/CC: VU#566640 // CERT/CC: VU#651994 // CERT/CC: VU#315308 // VULHUB: VHN-5413 // JVNDB: JVNDB-2002-000146 // CNNVD: CNNVD-200210-194 // NVD: CVE-2002-1024

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-5413 // JVNDB: JVNDB-2002-000146 // NVD: CVE-2002-1024

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200210-194

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200210-194

CONFIGURATIONS

sources: JVNDB: JVNDB-2002-000146

PATCH

title:SSH-scanningurl:http://www.cisco.com/warp/public/707/SSH-scanning.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2002-000146

EXTERNAL IDS

db:BIDid:5114

Trust: 3.3

db:CERT/CCid:VU#290140

Trust: 3.3

db:CERT/CCid:VU#13877

Trust: 3.2

db:NVDid:CVE-2002-1024

Trust: 2.5

db:CERT/CCid:VU#945216

Trust: 2.4

db:CERT/CCid:VU#25309

Trust: 2.4

db:BIDid:2405

Trust: 1.1

db:XFid:6449

Trust: 0.8

db:BIDid:2347

Trust: 0.8

db:XFid:6083

Trust: 0.8

db:XFid:6135

Trust: 0.8

db:CERT/CCid:VU#566640

Trust: 0.8

db:BIDid:2335

Trust: 0.8

db:XFid:6063

Trust: 0.8

db:CERT/CCid:VU#651994

Trust: 0.8

db:XFid:6472

Trust: 0.8

db:CERT/CCid:VU#315308

Trust: 0.8

db:JVNDBid:JVNDB-2002-000146

Trust: 0.8

db:CNNVDid:CNNVD-200210-194

Trust: 0.7

db:CISCOid:20020627 SCANNING FOR SSH CAN CAUSE A CRASH

Trust: 0.6

db:XFid:9437

Trust: 0.6

db:VULHUBid:VHN-5413

Trust: 0.1

sources: CERT/CC: VU#290140 // CERT/CC: VU#13877 // CERT/CC: VU#25309 // CERT/CC: VU#945216 // CERT/CC: VU#566640 // CERT/CC: VU#651994 // CERT/CC: VU#315308 // VULHUB: VHN-5413 // BID: 2405 // JVNDB: JVNDB-2002-000146 // CNNVD: CNNVD-200210-194 // NVD: CVE-2002-1024

REFERENCES

url:http://www.securityfocus.com/bid/5114

Trust: 4.3

url:http://www.cisco.com/warp/public/707/ssh-scanning.shtml

Trust: 3.5

url:http://www.kb.cert.org/vuls/id/290140

Trust: 3.5

url:http://www.iss.net/security_center/static/9437.php

Trust: 2.7

url:http://www.kb.cert.org/vuls/id/13877

Trust: 2.4

url:http://www.ssh.com/products/ssh/cert/

Trust: 2.4

url:http://www.cert.org/advisories/ca-2001-35.html

Trust: 1.6

url:http://www.kb.cert.org/vuls/id/945216

Trust: 1.6

url:http://www.kb.cert.org/vuls/id/25309

Trust: 1.6

url:http://www.cisco.com/warp/public/707/ssh-multiple-pub.html

Trust: 0.8

url:http://www.corest.com/files/files/11/crc32.pdf

Trust: 0.8

url:http://www1.corest.com/common/showdoc.php?idx=131&idxseccion=10

Trust: 0.8

url:http://xforce.iss.net/static/6449.php

Trust: 0.8

url:http://razor.bindview.com/publish/advisories/adv_ssh1crc.html

Trust: 0.8

url:http://www1.corest.com/common/showdoc.php?idx=81&idxsection=10#

Trust: 0.8

url:http://www.openssh.com/security.html

Trust: 0.8

url:http://www.securityfocus.com/bid/2347

Trust: 0.8

url:http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm

Trust: 0.8

url:http://xforce.iss.net/static/6083.php

Trust: 0.8

url:http://xforce.iss.net/alerts/advise100.php

Trust: 0.8

url:http://www.cryptnet.net/fcp/audit/pgp4pine/01.html

Trust: 0.8

url:http://www.securityfocus.com/bid/2405

Trust: 0.8

url:http://xforce.iss.net/static/6135.php

Trust: 0.8

url:http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html

Trust: 0.8

url:http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html

Trust: 0.8

url:http://pgp4pine.flatline.de/

Trust: 0.8

url:http://www.securityfocus.com/bid/2335

Trust: 0.8

url:http://xforce.iss.net/static/6063.php

Trust: 0.8

url:http://www.securityfocus.com/archive/1/160452

Trust: 0.8

url:http://xforce.iss.net/static/6472.php

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1024

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1024

Trust: 0.8

sources: CERT/CC: VU#290140 // CERT/CC: VU#13877 // CERT/CC: VU#25309 // CERT/CC: VU#945216 // CERT/CC: VU#566640 // CERT/CC: VU#651994 // CERT/CC: VU#315308 // VULHUB: VHN-5413 // JVNDB: JVNDB-2002-000146 // CNNVD: CNNVD-200210-194 // NVD: CVE-2002-1024

CREDITS

Cisco Systems Product Security Incident Response Team※ psirt@cisco.com

Trust: 0.6

sources: CNNVD: CNNVD-200210-194

SOURCES

db:CERT/CCid:VU#290140
db:CERT/CCid:VU#13877
db:CERT/CCid:VU#25309
db:CERT/CCid:VU#945216
db:CERT/CCid:VU#566640
db:CERT/CCid:VU#651994
db:CERT/CCid:VU#315308
db:VULHUBid:VHN-5413
db:BIDid:2405
db:JVNDBid:JVNDB-2002-000146
db:CNNVDid:CNNVD-200210-194
db:NVDid:CVE-2002-1024

LAST UPDATE DATE

2024-11-22T20:04:51.864000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#290140date:2002-12-12T00:00:00
db:CERT/CCid:VU#13877date:2003-05-20T00:00:00
db:CERT/CCid:VU#25309date:2002-03-05T00:00:00
db:CERT/CCid:VU#945216date:2003-05-20T00:00:00
db:CERT/CCid:VU#566640date:2002-01-15T00:00:00
db:CERT/CCid:VU#651994date:2001-06-26T00:00:00
db:CERT/CCid:VU#315308date:2002-03-05T00:00:00
db:VULHUBid:VHN-5413date:2018-10-30T00:00:00
db:BIDid:2405date:2001-02-20T00:00:00
db:JVNDBid:JVNDB-2002-000146date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200210-194date:2007-09-05T00:00:00
db:NVDid:CVE-2002-1024date:2024-11-20T23:40:25.040

SOURCES RELEASE DATE

db:CERT/CCid:VU#290140date:2002-06-27T00:00:00
db:CERT/CCid:VU#13877date:2001-11-07T00:00:00
db:CERT/CCid:VU#25309date:2000-09-26T00:00:00
db:CERT/CCid:VU#945216date:2001-10-24T00:00:00
db:CERT/CCid:VU#566640date:2001-07-12T00:00:00
db:CERT/CCid:VU#651994date:2001-05-16T00:00:00
db:CERT/CCid:VU#315308date:2001-01-18T00:00:00
db:VULHUBid:VHN-5413date:2002-10-04T00:00:00
db:BIDid:2405date:2001-02-20T00:00:00
db:JVNDBid:JVNDB-2002-000146date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200210-194date:2002-06-27T00:00:00
db:NVDid:CVE-2002-1024date:2002-10-04T04:00:00