First published: Wed Jun 27 2001(Updated: )
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =1.2.3 | |
OpenSSH | =2.1 | |
OpenSSH | =2.1.1 | |
SSH (Secure Shell) | <=1.2.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0361 is classified as a medium severity vulnerability due to its potential to allow decryption and alteration of SSH traffic.
To fix CVE-2001-0361, upgrade OpenSSH to version 2.3.1 or newer, or ensure your SSH implementation does not use vulnerable configurations.
CVE-2001-0361 affects OpenSSH versions up to 2.3.0, as well as SSH version 1.5 implementations up to 1.2.31.
Yes, CVE-2001-0361 can be exploited remotely, allowing attackers to decrypt and alter traffic.
CVE-2001-0361 utilizes a Bleichenbacher attack on PKCS#1 version 1.5 to compromise SSH communications.