CVE-2001-1473

Severity

75%

Complexity

99%

Confidentiality

106%

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

SSH Communications Security SSH daemon

First reported 24 years ago

2001-01-18 05:00:00

Last updated 7 years ago

2017-07-11 01:29:00

Affected Software

SSH Communications Security SSH daemon 1.2.24

1.2.24

SSH Communications Security SSH daemon 1.2.25

1.2.25

SSH Communications Security SSH daemon 1.2.26

1.2.26

SSH Communications Security SSH daemon 1.2.27

1.2.27

SSH Communications Security SSH daemon 1.2.28

1.2.28

SSH Communications Security SSH daemon 1.2.29

1.2.29

SSH Communications Security SSH daemon 1.2.30

1.2.30

SSH Communications Security SSH daemon 1.2.31

1.2.31

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.