The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original messages cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ssh | Ssh | 1.2.24 (including) | 1.2.24 (including) |
Ssh | Ssh | 1.2.25 (including) | 1.2.25 (including) |
Ssh | Ssh | 1.2.26 (including) | 1.2.26 (including) |
Ssh | Ssh | 1.2.27 (including) | 1.2.27 (including) |
Ssh | Ssh | 1.2.28 (including) | 1.2.28 (including) |
Ssh | Ssh | 1.2.29 (including) | 1.2.29 (including) |
Ssh | Ssh | 1.2.30 (including) | 1.2.30 (including) |
Ssh | Ssh | 1.2.31 (including) | 1.2.31 (including) |