{"vuid":"VU#290140","idnumber":"290140","name":"Multiple Cisco products consume excessive CPU resources in response to large SSH packets","keywords":["Cisco","VU#13877","VU#945216","SSH","scan","denial of service","DOS","CSCdw33027","CSCdw29965","CSCdv85279","CSCdw59394","CSCdx59197","22/tcp"],"overview":"Multiple Cisco networking products contain a denial-of-service vulnerability.","clean_desc":"Multiple Cisco networking products contain a vulnerability that allows large SSH packets to cause excessive consumption of CPU resources. In some circumstances, this resource consumption may cause the affected device to reboot. This vulnerability is a side effect of a Cisco patch for VU#13877, an SSH packet injection vulnerability. Please note that this patch does not contain the integer overflow vulnerability described in VU#945216. However, according to Cisco's Security Advisory, this denial-of-service vulnerability may be triggered by attempts to exploit VU#945216.","impact":"Remote attackers may conduct denial-of-service attacks against affected devices.","resolution":"Apply a patch Cisco has published a Security Advisory to address this vulnerability. For information regarding affected devices and obtaining patches, please see http://www.cisco.com/warp/public/707/SSH-scanning.shtml","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Jeffrey P. Lanza and is based on information provided by Cisco.","public":["http://www.cisco.com/warp/public/707/SSH-scanning.shtml","http://www.cert.org/advisories/CA-2001-35.html","http://www.kb.cert.org/vuls/id/945216","http://www.kb.cert.org/vuls/id/13877","http://www.securityfocus.com/bid/5114"],"cveids":["CVE-2002-1024"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-06-27T22:24:29Z","publicdate":"2002-06-27T00:00:00Z","datefirstpublished":"2002-06-27T23:31:24Z","dateupdated":"2002-12-12T23:25:10Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"10","cam_internetinfrastructure":"20","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"21.09375","cam_scorecurrentwidelyknown":"21.09375","cam_scorecurrentwidelyknownexploited":"25.3125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":21.09375,"vulnote":null}