First published: Thu Oct 18 2001(Updated: )
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <=2.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1380 is classified as a high-severity vulnerability due to its potential to allow unauthorized remote access.
To fix CVE-2001-1380, upgrade OpenSSH to version 2.9.9 or later.
The risks of CVE-2001-1380 include unauthorized access to systems that could lead to data breaches and compromised security.
CVE-2001-1380 affects OpenSSH versions prior to 2.9.9, specifically those using keypairs in the authorized_keys2 file.
Yes, CVE-2001-1380 can be exploited remotely, allowing attackers to bypass restrictions on IP addresses.