First published: Thu Sep 27 2001(Updated: )
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <=2.9.9p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1382 has a medium severity level due to its potential to allow remote attackers to exploit echo packet behavior.
To fix CVE-2001-1382, upgrade OpenSSH to version 2.9.9p3 or later.
CVE-2001-1382 exploits the 'echo simulation' traffic analysis countermeasure, potentially revealing information about its usage.
No, CVE-2001-1382 is not present in OpenSSH versions later than 2.9.9p2.
Users running OpenSSH versions prior to 2.9.9p3 are affected by CVE-2001-1382.