First published: Fri Jul 27 2001(Updated: )
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.5 | |
SSH (Secure Shell) | =1.2.24 | |
SSH (Secure Shell) | =1.2.25 | |
SSH (Secure Shell) | =1.2.26 | |
SSH (Secure Shell) | =1.2.27 | |
SSH (Secure Shell) | =1.2.28 | |
SSH (Secure Shell) | =1.2.29 | |
SSH (Secure Shell) | =1.2.30 | |
SSH (Secure Shell) | =1.2.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0572 is considered a medium severity vulnerability due to its potential for password information leakage.
To fix CVE-2001-0572, upgrade to a secure version of OpenSSH or SSH that addresses the identified weaknesses.
OpenSSH versions prior to 4.5 are affected by CVE-2001-0572.
Yes, CVE-2001-0572 can be exploited remotely by an attacker to obtain sensitive information.
CVE-2001-0572 can leak password lengths and whether RSA keys are used, aiding brute force attacks.