First published: Tue Aug 14 2001(Updated: )
SSH Secure Shell 3.0.0 on Unix systems does not properly perform password authentication to the sshd2 daemon, which allows local users to gain access to accounts with short password fields, such as locked accounts that use "NP" in the password field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH (Secure Shell) | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0553 is classified as a medium severity vulnerability due to its potential to allow unauthorized local access.
To mitigate CVE-2001-0553, upgrade SSH Secure Shell to a version later than 3.0.0 that properly implements password authentication.
CVE-2001-0553 affects systems running SSH Secure Shell version 3.0.0 on Unix platforms.
The main risk with CVE-2001-0553 is the possibility that local users may access locked accounts with weak password fields.
Yes, CVE-2001-0553 has been documented and is recognized as a vulnerability that can be exploited under specific conditions.