Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
Threat-Mapped Scoring
Score: 1.9
Priority: P3 - Important (Medium)
S9 – Sabotage of System/App
S10 – Denial of Service (+0.1 bonus)
EPSS
Score: 0.18474 Percentile:
0.94942
CVSS Scoring
CVSS v2 Score: 10.0
Severity:
Mapped CWE(s)
CWE-119
: Improper Restriction of Operations within the Bounds of a Memory Buffer
All CAPEC(s)
CAPEC-10: Buffer Overflow via Environment Variables