CVE Vulnerabilities

CVE-2001-1473

Published: Jan 18, 2001 | Modified: Jul 11, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the targets public key, which allows the attacker to compute the corresponding private key and use the targets Session ID with the compromised key pair to masquerade as the target.

Affected Software

Name Vendor Start Version End Version
Ssh Ssh 1.2.24 (including) 1.2.24 (including)
Ssh Ssh 1.2.25 (including) 1.2.25 (including)
Ssh Ssh 1.2.26 (including) 1.2.26 (including)
Ssh Ssh 1.2.27 (including) 1.2.27 (including)
Ssh Ssh 1.2.28 (including) 1.2.28 (including)
Ssh Ssh 1.2.29 (including) 1.2.29 (including)
Ssh Ssh 1.2.30 (including) 1.2.30 (including)
Ssh Ssh 1.2.31 (including) 1.2.31 (including)

References