CVE-2002-1359 – PuTTy.exe 0.53 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-1359
Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite. • https://www.exploit-db.com/exploits/16463 https://www.exploit-db.com/exploits/1788 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html http://securitytracker.com/id?1005812 http://securitytracker.com/id?1005813 http://www.cert.org/advisories/CA-2002-36.html http://www.securityfocus.com/bid/6407 https://exchange.xforce.ibmcloud.com/vulnerabilities/10870 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5848 • CWE-20: Improper Input Validation •
CVE-2002-1024
https://notcve.org/view.php?id=CVE-2002-1024
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). • http://www.cisco.com/warp/public/707/SSH-scanning.shtml http://www.iss.net/security_center/static/9437.php http://www.kb.cert.org/vuls/id/290140 http://www.securityfocus.com/bid/5114 • CWE-399: Resource Management Errors •
CVE-2002-0339
https://notcve.org/view.php?id=CVE-2002-0339
Cisco IOS 11.1CC through 12.2 with Cisco Express Forwarding (CEF) enabled includes portions of previous packets in the padding of a MAC level packet when the MAC packet's length is less than the IP level packet length. • http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml http://www.iss.net/security_center/static/8296.php http://www.kb.cert.org/vuls/id/310387 http://www.osvdb.org/806 http://www.securityfocus.com/bid/4191 •
CVE-2001-0929
https://notcve.org/view.php?id=CVE-2001-0929
Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. • http://www.cisco.com/warp/public/707/IOS-cbac-dynacl-pub.shtml http://www.kb.cert.org/vuls/id/362483 http://www.osvdb.org/808 http://www.securityfocus.com/bid/3588 https://exchange.xforce.ibmcloud.com/vulnerabilities/7614 •
CVE-2001-1097 – Cisco IOS 12 - UDP Denial of Service
https://notcve.org/view.php?id=CVE-2001-1097
Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to cause a denial of service via a flood of UDP packets. • https://www.exploit-db.com/exploits/21028 http://marc.info/?l=bugtraq&m=99749327219189&w=2 http://www.securityfocus.com/archive/1/199558 http://www.securityfocus.com/bid/3096 https://exchange.xforce.ibmcloud.com/vulnerabilities/6913 •