First published: Thu Jan 18 2001(Updated: )
The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message's cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH (Secure Shell) | =1.2.24 | |
SSH (Secure Shell) | =1.2.25 | |
SSH (Secure Shell) | =1.2.26 | |
SSH (Secure Shell) | =1.2.27 | |
SSH (Secure Shell) | =1.2.28 | |
SSH (Secure Shell) | =1.2.29 | |
SSH (Secure Shell) | =1.2.30 | |
SSH (Secure Shell) | =1.2.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1469 is considered a critical vulnerability due to its ability to allow remote message modification without detection.
To fix CVE-2001-1469, upgrade to a version of SSH that is not affected by this vulnerability, specifically versions later than 1.2.31.
CVE-2001-1469 affects SSH versions 1.2.24 through 1.2.31.
CVE-2001-1469 facilitates message modification attacks by exploiting the RC4 stream cipher in SSH1.
CVE-2001-1469 specifically affects SSH1 and is not present in SSH2 implementations.