First published: Thu Jan 18 2001(Updated: )
The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH (Secure Shell) | =1.2.31 | |
SSH (Secure Shell) | =1.2.24 | |
SSH (Secure Shell) | =1.2.25 | |
SSH (Secure Shell) | =1.2.30 | |
SSH (Secure Shell) | =1.2.26 | |
SSH (Secure Shell) | =1.2.27 | |
SSH (Secure Shell) | =1.2.28 | |
SSH (Secure Shell) | =1.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1470 is considered a moderate severity vulnerability due to its potential to allow undetected message modification.
To fix CVE-2001-1470, upgrade to a secure version of SSH that does not use the vulnerable IDEA cipher.
CVE-2001-1470 affects SSH versions 1.2.24 through 1.2.31.
CVE-2001-1470 facilitates remote attackers to modify the final block of a message undetected.
Yes, the IDEA cipher implementation in SSH1 is affected, undermining the integrity of encrypted messages.