CVE-2002-1024 : Detail

CVE-2002-1024

0.76%V3
Network
2003-04-02
03h00 +00:00
2009-03-01
23h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.1 AV:N/AC:M/Au:N/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Cisco>>Ios >> Version 12.0s

Cisco>>Ios >> Version 12.0sp

Cisco>>Ios >> Version 12.0st

Cisco>>Ios >> Version 12.0xb

Cisco>>Ios >> Version 12.0xm

Cisco>>Ios >> Version 12.0xv

Cisco>>Ios >> Version 12.1\(1\)ex

Cisco>>Ios >> Version 12.1\(5c\)ex

Cisco>>Ios >> Version 12.1\(8a\)ex

Cisco>>Ios >> Version 12.1\(9\)ex

Cisco>>Ios >> Version 12.1e

Cisco>>Ios >> Version 12.1ec

Cisco>>Ios >> Version 12.1t

Cisco>>Ios >> Version 12.1xb

Cisco>>Ios >> Version 12.1xc

Cisco>>Ios >> Version 12.1xf

Cisco>>Ios >> Version 12.1xg

Cisco>>Ios >> Version 12.1xh

Cisco>>Ios >> Version 12.1xi

Cisco>>Ios >> Version 12.1xj

Cisco>>Ios >> Version 12.1xl

Cisco>>Ios >> Version 12.1xm

Cisco>>Ios >> Version 12.1xp

Cisco>>Ios >> Version 12.1xq

Cisco>>Ios >> Version 12.1xt

Cisco>>Ios >> Version 12.1xu

Cisco>>Ios >> Version 12.1yb

Cisco>>Ios >> Version 12.1yc

Cisco>>Ios >> Version 12.1yd

Cisco>>Ios >> Version 12.1ye

Cisco>>Ios >> Version 12.1yf

Cisco>>Ios >> Version 12.1yi

Cisco>>Ios >> Version 12.2

Cisco>>Ios >> Version 12.2b

Cisco>>Ios >> Version 12.2bc

Cisco>>Ios >> Version 12.2da

Cisco>>Ios >> Version 12.2dd

Cisco>>Ios >> Version 12.2s

Cisco>>Ios >> Version 12.2t

Cisco>>Ios >> Version 12.2xa

Cisco>>Ios >> Version 12.2xb

Cisco>>Ios >> Version 12.2xd

Cisco>>Ios >> Version 12.2xe

Cisco>>Ios >> Version 12.2xf

Cisco>>Ios >> Version 12.2xg

Cisco>>Ios >> Version 12.2xh

Cisco>>Ios >> Version 12.2xi

Cisco>>Ios >> Version 12.2xj

Cisco>>Ios >> Version 12.2xk

Cisco>>Ios >> Version 12.2xl

Cisco>>Ios >> Version 12.2xm

Cisco>>Ios >> Version 12.2xn

Cisco>>Ios >> Version 12.2xq

Cisco>>Ios >> Version 12.2xr

Cisco>>Ios >> Version 12.2xs

Cisco>>Ios >> Version 12.2xt

Cisco>>Ios >> Version 12.2xw

Cisco>>Ios >> Version 12.2ya

Cisco>>Ios >> Version 12.2yb

Cisco>>Ios >> Version 12.2yc

Cisco>>Ios >> Version 12.2yd

Cisco>>Ios >> Version 12.2yf

Cisco>>Ios >> Version 12.2yg

Cisco>>Ios >> Version 12.2yh

Cisco>>Pix_firewall_software >> Version 5.2

Cisco>>Pix_firewall_software >> Version 5.3

Cisco>>Pix_firewall_software >> Version 6.0

Cisco>>Pix_firewall_software >> Version 6.1

Cisco>>Pix_firewall_software >> Version 6.2

Cisco>>Css11000_content_services_switch >> Version *

    Configuraton 0

    Cisco>>Catos >> Version 5.3\(1\)csx

    Cisco>>Catos >> Version 5.3\(1a\)csx

    Cisco>>Catos >> Version 5.3\(2\)csx

    Cisco>>Catos >> Version 5.3\(3\)csx

    Cisco>>Catos >> Version 5.3\(4\)csx

    Cisco>>Catos >> Version 5.3\(5\)csx

    Cisco>>Catos >> Version 5.3\(5a\)csx

    Cisco>>Catos >> Version 5.3\(6\)csx

    Cisco>>Catos >> Version 5.4

    Cisco>>Catos >> Version 5.4\(1\)

    Cisco>>Catos >> Version 5.4\(2\)

    Cisco>>Catos >> Version 5.4\(3\)

    Cisco>>Catos >> Version 5.4\(4\)

    Cisco>>Catos >> Version 5.5

    Cisco>>Catos >> Version 5.5\(1\)

    Cisco>>Catos >> Version 5.5\(2\)

    Cisco>>Catos >> Version 5.5\(3\)

    Cisco>>Catos >> Version 5.5\(4\)

    Cisco>>Catos >> Version 5.5\(4a\)

    Cisco>>Catos >> Version 5.5\(4b\)

    Cisco>>Catos >> Version 5.5\(13\)

    Cisco>>Catos >> Version 6.1\(1\)

    Cisco>>Catos >> Version 6.1\(1a\)

    Cisco>>Catos >> Version 6.1\(1b\)

    Cisco>>Catos >> Version 6.1\(1c\)

    Cisco>>Catos >> Version 6.1\(2.13\)

    Cisco>>Catos >> Version 6.2\(0.110\)

    Cisco>>Catos >> Version 6.2\(0.111\)

    Cisco>>Catos >> Version 6.3\(0.7\)pan

    Cisco>>Catos >> Version 6.3\(4\)

    Cisco>>Catos >> Version 7.1

    Cisco>>Catos >> Version 7.1\(2\)

    References

    http://www.securityfocus.com/bid/5114
    Tags : vdb-entry, x_refsource_BID
    http://www.kb.cert.org/vuls/id/290140
    Tags : third-party-advisory, x_refsource_CERT-VN
    http://www.cisco.com/warp/public/707/SSH-scanning.shtml
    Tags : vendor-advisory, x_refsource_CISCO