First published: Fri Jul 27 2001(Updated: )
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ssh Ssh | =1.2.31 | |
Ssh Ssh | =1.2.24 | |
Ssh Ssh | =1.2.25 | |
Ssh Ssh | =1.2.30 | |
Openbsd Openssh | =4.5 | |
Ssh Ssh | =1.2.26 | |
Ssh Ssh | =1.2.27 | |
Ssh Ssh | =1.2.28 | |
Ssh Ssh | =1.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.