CVE-2002-1059
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2016-10-17 22:23:33
NMCOEPS    

[原文]Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.


[CNNVD]VanDyke SecureCRT SSH1协议处理远程缓冲区溢出漏洞(CNNVD-200210-223)

        
        SecureCRT是一款流行的SSH客户端,可使用在Microsoft Windows操作系统下。
        SecureCRT对服务器返回的SSH1协议版本号信息缺少正确的处理,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        当SecureCRT连接SSH1服务器时,服务程序会返回包含重要和次要数字的协议版本字符串,SecureCRT对返回的协议版本字符串缺少正确的边界缓冲检查,远程攻击者可以利用这个漏洞提交超长的协议版本字符串给SecureCRT处理,可导致客户端产生缓冲区溢出攻击,精心构建提交的协议版本字符串可能可以以SecureCRT进程在系统中执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:van_dyke_technologies:securecrt:3.4.3
cpe:/a:van_dyke_technologies:securecrt:3.4.4
cpe:/a:van_dyke_technologies:securecrt:3.3.2
cpe:/a:van_dyke_technologies:securecrt:3.4.1
cpe:/a:van_dyke_technologies:securecrt:3.3.3
cpe:/a:van_dyke_technologies:securecrt:3.4.2
cpe:/a:van_dyke_technologies:securecrt:4.0_beta_1
cpe:/a:van_dyke_technologies:securecrt:3.4.5
cpe:/a:van_dyke_technologies:securecrt:3.0
cpe:/a:van_dyke_technologies:securecrt:3.2
cpe:/a:van_dyke_technologies:securecrt:4.0_beta_2
cpe:/a:van_dyke_technologies:securecrt:3.1
cpe:/a:van_dyke_technologies:securecrt:3.1.2
cpe:/a:van_dyke_technologies:securecrt:3.2.1
cpe:/a:van_dyke_technologies:securecrt:3.4
cpe:/a:van_dyke_technologies:securecrt:2.4
cpe:/a:van_dyke_technologies:securecrt:3.3
cpe:/a:van_dyke_technologies:securecrt:3.3.1
cpe:/a:van_dyke_technologies:securecrt:3.1.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1059
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1059
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-223
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=102744150718462&w=2
(UNKNOWN)  BUGTRAQ  20020723 Arbitrary Code Execution Vulnerability in VanDyke SecureCRT 3.4 & 4.0 beta
http://marc.info/?l=bugtraq&m=102746007908689&w=2
(UNKNOWN)  BUGTRAQ  20020723 Re: Arbitrary Code Execution Vulnerability in VanDyke SecureCRTbitrary Code Execution Vulnerability ir9c cl) q&am widd wwidth=\ton Vulo UGTnbsp;BUGTRAQ a>cppd-brwidth=\tfeDOR_ADVISORY&m=1XFamp;m=1ord-break-ssh1-id UGifiop-st(RAQ ) Code Execution Vulnerability in VanDyke Sle="OSVDB">OSs:' ?bttp5287ility ir9c cl) q&am widle="OSVDB">OSs:' ?bttp5287pd-brwidth=\tfeDOR_ADVISORY&m=1BIDamp;m=15287 Code Execution Vulnerability in VanDyke Swidh=\"s:' ?produchCorrd-breakh=\ton Vu07-25-02 ty ir9c cl) q&am widwidh=\"s:' ?produchCorrd-breakh=\ton Vu07-25-02 marc.info/?l=bugtraq&m=1CONFIRMamp;m=12> q&am widwidh=\"s:' ?produchCorrd-breakh=\ton Vu07-25-02 Code Executi_plain" t Security