First published: Thu May 24 2001(Updated: )
SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH (Secure Shell) | <=1.2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2001-0471 is considered to be high due to the potential for account compromise through undetected brute force attacks.
To fix CVE-2001-0471, upgrade to a version of SSH daemon newer than 1.2.30 that includes fixes for logging repeated login attempts.
The risks associated with CVE-2001-0471 include unauthorized access to accounts through repeated, unlogged login attempts by remote attackers.
CVE-2001-0471 affects SSH daemon version 1 (SSHD-1) version 1.2.30 and earlier.
Yes, CVE-2001-0471 can be exploited remotely, allowing attackers to launch brute force login attempts without being logged.