The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message’s cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ssh | Ssh | 1.2.24 | 1.2.24 |
Ssh | Ssh | 1.2.25 | 1.2.25 |
Ssh | Ssh | 1.2.26 | 1.2.26 |
Ssh | Ssh | 1.2.27 | 1.2.27 |
Ssh | Ssh | 1.2.28 | 1.2.28 |
Ssh | Ssh | 1.2.29 | 1.2.29 |
Ssh | Ssh | 1.2.30 | 1.2.30 |
Ssh | Ssh | 1.2.31 | 1.2.31 |