All the vulnerabilites related to ssh - ssh
cve-2000-0992
Vulnerability from cvelistv5
Published
2001-01-22 05:00
Modified
2024-08-08 05:37
Severity ?
Summary
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:37:32.213Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "scp-overwrite-files(5312)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312"
          },
          {
            "name": "MDKSA-2000:057",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057"
          },
          {
            "name": "20000930 scp file transfer hole",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html"
          },
          {
            "name": "1742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "scp-overwrite-files(5312)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312"
        },
        {
          "name": "MDKSA-2000:057",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057"
        },
        {
          "name": "20000930 scp file transfer hole",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html"
        },
        {
          "name": "1742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0992",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "scp-overwrite-files(5312)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312"
            },
            {
              "name": "MDKSA-2000:057",
              "refsource": "MANDRAKE",
              "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057"
            },
            {
              "name": "20000930 scp file transfer hole",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html"
            },
            {
              "name": "1742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0992",
    "datePublished": "2001-01-22T05:00:00",
    "dateReserved": "2000-11-24T00:00:00",
    "dateUpdated": "2024-08-08T05:37:32.213Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-48795
Vulnerability from cvelistv5
Published
2023-12-18 00:00
Modified
2024-08-02 21:46
Severity ?
Summary
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
References
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
https://matt.ucc.asn.au/dropbear/CHANGES
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
https://www.netsarang.com/en/xshell-update-history/
https://www.paramiko.org/changelog.html
https://www.openssh.com/openbsd.html
https://github.com/openssh/openssh-portable/commits/master
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
https://www.bitvise.com/ssh-server-version-history
https://github.com/ronf/asyncssh/tags
https://gitlab.com/libssh/libssh-mirror/-/tags
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
https://www.openssh.com/txt/release-9.6
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
https://www.terrapin-attack.com
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
https://github.com/warp-tech/russh/releases/tag/v0.40.2
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
https://www.openwall.com/lists/oss-security/2023/12/18/2
https://twitter.com/TrueSkrillor/status/1736774389725565005
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
https://github.com/paramiko/paramiko/issues/2337
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
https://news.ycombinator.com/item?id=38684904
https://news.ycombinator.com/item?id=38685286
http://www.openwall.com/lists/oss-security/2023/12/18/3mailing-list
https://github.com/mwiede/jsch/issues/457
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
https://github.com/advisories/GHSA-45x7-px36-x8w8
https://security-tracker.debian.org/tracker/source-package/libssh2
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
https://security-tracker.debian.org/tracker/CVE-2023-48795
https://bugzilla.suse.com/show_bug.cgi?id=1217950
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
https://bugs.gentoo.org/920280
https://ubuntu.com/security/CVE-2023-48795
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
https://access.redhat.com/security/cve/cve-2023-48795
https://github.com/mwiede/jsch/pull/461
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
https://github.com/libssh2/libssh2/pull/1291
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
https://github.com/rapier1/hpn-ssh/releases
https://github.com/proftpd/proftpd/issues/456
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
https://oryx-embedded.com/download/#changelog
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
https://crates.io/crates/thrussh/versions
https://github.com/NixOS/nixpkgs/pull/275249
http://www.openwall.com/lists/oss-security/2023/12/19/5mailing-list
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
http://www.openwall.com/lists/oss-security/2023/12/20/3mailing-list
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
https://github.com/apache/mina-sshd/issues/445
https://github.com/hierynomus/sshj/issues/916
https://github.com/janmojzis/tinyssh/issues/81
https://www.openwall.com/lists/oss-security/2023/12/20/3
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/vendor-advisory
https://www.debian.org/security/2023/dsa-5586vendor-advisory
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
https://filezilla-project.org/versions.php
https://nova.app/releases/#v11.8
https://roumenpetrov.info/secsh/#news20231220
https://www.vandyke.com/products/securecrt/history.txt
https://help.panic.com/releasenotes/transmit5/
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
https://winscp.net/eng/docs/history#6.2.2
https://www.bitvise.com/ssh-client-version-history#933
https://github.com/cyd01/KiTTY/issues/520
https://www.debian.org/security/2023/dsa-5588vendor-advisory
https://github.com/ssh-mitm/ssh-mitm/issues/165
https://news.ycombinator.com/item?id=38732005
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlmailing-list
https://security.gentoo.org/glsa/202312-16vendor-advisory
https://security.gentoo.org/glsa/202312-17vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/vendor-advisory
https://security.netapp.com/advisory/ntap-20240105-0004/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/vendor-advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/vendor-advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlmailing-list
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlmailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/vendor-advisory
https://support.apple.com/kb/HT214084
http://seclists.org/fulldisclosure/2024/Mar/21mailing-list
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlmailing-list
http://www.openwall.com/lists/oss-security/2024/04/17/8mailing-list
http://www.openwall.com/lists/oss-security/2024/03/06/3mailing-list
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:46:27.255Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://matt.ucc.asn.au/dropbear/CHANGES"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.netsarang.com/en/xshell-update-history/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.paramiko.org/changelog.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openssh.com/openbsd.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/openssh/openssh-portable/commits/master"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.bitvise.com/ssh-server-version-history"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/ronf/asyncssh/tags"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libssh/libssh-mirror/-/tags"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openssh.com/txt/release-9.6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.terrapin-attack.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/warp-tech/russh/releases/tag/v0.40.2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/18/2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://twitter.com/TrueSkrillor/status/1736774389725565005"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/paramiko/paramiko/issues/2337"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://news.ycombinator.com/item?id=38684904"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://news.ycombinator.com/item?id=38685286"
          },
          {
            "name": "[oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/18/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mwiede/jsch/issues/457"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10\u0026id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/erlang/otp/releases/tag/OTP-26.2.1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/advisories/GHSA-45x7-px36-x8w8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/source-package/libssh2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2023-48795"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1217950"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/920280"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ubuntu.com/security/CVE-2023-48795"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2023-48795"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mwiede/jsch/pull/461"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/libssh2/libssh2/pull/1291"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://forum.netgate.com/topic/184941/terrapin-ssh-attack"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/rapier1/hpn-ssh/releases"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/proftpd/proftpd/issues/456"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://oryx-embedded.com/download/#changelog"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://crates.io/crates/thrussh/versions"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/NixOS/nixpkgs/pull/275249"
          },
          {
            "name": "[oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/19/5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/"
          },
          {
            "name": "[oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/20/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/apache/mina-sshd/issues/445"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/hierynomus/sshj/issues/916"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/janmojzis/tinyssh/issues/81"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/20/3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16"
          },
          {
            "name": "FEDORA-2023-0733306be9",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/"
          },
          {
            "name": "DSA-5586",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5586"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.theregister.com/2023/12/20/terrapin_attack_ssh"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://filezilla-project.org/versions.php"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://nova.app/releases/#v11.8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://roumenpetrov.info/secsh/#news20231220"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vandyke.com/products/securecrt/history.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://help.panic.com/releasenotes/transmit5/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2189"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://winscp.net/eng/docs/history#6.2.2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.bitvise.com/ssh-client-version-history#933"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/cyd01/KiTTY/issues/520"
          },
          {
            "name": "DSA-5588",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5588"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/ssh-mitm/ssh-mitm/issues/165"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://news.ycombinator.com/item?id=38732005"
          },
          {
            "name": "[debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html"
          },
          {
            "name": "GLSA-202312-16",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202312-16"
          },
          {
            "name": "GLSA-202312-17",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202312-17"
          },
          {
            "name": "FEDORA-2023-20feb865d8",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/"
          },
          {
            "name": "FEDORA-2023-cb8c606fbb",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/"
          },
          {
            "name": "FEDORA-2023-e77300e4b5",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/"
          },
          {
            "name": "FEDORA-2023-b87ec6cf47",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/"
          },
          {
            "name": "FEDORA-2023-153404713b",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240105-0004/"
          },
          {
            "name": "FEDORA-2024-3bb23c77f3",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/"
          },
          {
            "name": "FEDORA-2023-55800423a8",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/"
          },
          {
            "name": "FEDORA-2024-d946b9ad25",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/"
          },
          {
            "name": "FEDORA-2024-71c2c6526c",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/"
          },
          {
            "name": "FEDORA-2024-39a8c72ea9",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002"
          },
          {
            "name": "FEDORA-2024-ae653fb07b",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
          },
          {
            "name": "FEDORA-2024-2705241461",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/"
          },
          {
            "name": "FEDORA-2024-fb32950d11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
          },
          {
            "name": "FEDORA-2024-7b08207cdb",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/"
          },
          {
            "name": "FEDORA-2024-06ebb70bdd",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/"
          },
          {
            "name": "[debian-lts-announce] 20240125 [SECURITY] [DLA 3718-1] php-phpseclib security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html"
          },
          {
            "name": "[debian-lts-announce] 20240125 [SECURITY] [DLA 3719-1] phpseclib security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html"
          },
          {
            "name": "FEDORA-2024-a53b24023d",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/"
          },
          {
            "name": "FEDORA-2024-3fd1bc9276",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT214084"
          },
          {
            "name": "20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2024/Mar/21"
          },
          {
            "name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
          },
          {
            "name": "[oss-security] 20240417 Terrapin vulnerability in Jenkins CLI client",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/04/17/8"
          },
          {
            "name": "[oss-security] 20240306 Multiple vulnerabilities in Jenkins plugins",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-01T18:06:23.972272",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"
        },
        {
          "url": "https://matt.ucc.asn.au/dropbear/CHANGES"
        },
        {
          "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"
        },
        {
          "url": "https://www.netsarang.com/en/xshell-update-history/"
        },
        {
          "url": "https://www.paramiko.org/changelog.html"
        },
        {
          "url": "https://www.openssh.com/openbsd.html"
        },
        {
          "url": "https://github.com/openssh/openssh-portable/commits/master"
        },
        {
          "url": "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ"
        },
        {
          "url": "https://www.bitvise.com/ssh-server-version-history"
        },
        {
          "url": "https://github.com/ronf/asyncssh/tags"
        },
        {
          "url": "https://gitlab.com/libssh/libssh-mirror/-/tags"
        },
        {
          "url": "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/"
        },
        {
          "url": "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42"
        },
        {
          "url": "https://www.openssh.com/txt/release-9.6"
        },
        {
          "url": "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/"
        },
        {
          "url": "https://www.terrapin-attack.com"
        },
        {
          "url": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25"
        },
        {
          "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst"
        },
        {
          "url": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/"
        },
        {
          "url": "https://github.com/warp-tech/russh/releases/tag/v0.40.2"
        },
        {
          "url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/18/2"
        },
        {
          "url": "https://twitter.com/TrueSkrillor/status/1736774389725565005"
        },
        {
          "url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d"
        },
        {
          "url": "https://github.com/paramiko/paramiko/issues/2337"
        },
        {
          "url": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg"
        },
        {
          "url": "https://news.ycombinator.com/item?id=38684904"
        },
        {
          "url": "https://news.ycombinator.com/item?id=38685286"
        },
        {
          "name": "[oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/18/3"
        },
        {
          "url": "https://github.com/mwiede/jsch/issues/457"
        },
        {
          "url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10\u0026id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6"
        },
        {
          "url": "https://github.com/erlang/otp/releases/tag/OTP-26.2.1"
        },
        {
          "url": "https://github.com/advisories/GHSA-45x7-px36-x8w8"
        },
        {
          "url": "https://security-tracker.debian.org/tracker/source-package/libssh2"
        },
        {
          "url": "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg"
        },
        {
          "url": "https://security-tracker.debian.org/tracker/CVE-2023-48795"
        },
        {
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1217950"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
        },
        {
          "url": "https://bugs.gentoo.org/920280"
        },
        {
          "url": "https://ubuntu.com/security/CVE-2023-48795"
        },
        {
          "url": "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/"
        },
        {
          "url": "https://access.redhat.com/security/cve/cve-2023-48795"
        },
        {
          "url": "https://github.com/mwiede/jsch/pull/461"
        },
        {
          "url": "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6"
        },
        {
          "url": "https://github.com/libssh2/libssh2/pull/1291"
        },
        {
          "url": "https://forum.netgate.com/topic/184941/terrapin-ssh-attack"
        },
        {
          "url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5"
        },
        {
          "url": "https://github.com/rapier1/hpn-ssh/releases"
        },
        {
          "url": "https://github.com/proftpd/proftpd/issues/456"
        },
        {
          "url": "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1"
        },
        {
          "url": "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15"
        },
        {
          "url": "https://oryx-embedded.com/download/#changelog"
        },
        {
          "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update"
        },
        {
          "url": "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22"
        },
        {
          "url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab"
        },
        {
          "url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3"
        },
        {
          "url": "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC"
        },
        {
          "url": "https://crates.io/crates/thrussh/versions"
        },
        {
          "url": "https://github.com/NixOS/nixpkgs/pull/275249"
        },
        {
          "name": "[oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/19/5"
        },
        {
          "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc"
        },
        {
          "url": "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/"
        },
        {
          "name": "[oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack)",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/20/3"
        },
        {
          "url": "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html"
        },
        {
          "url": "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES"
        },
        {
          "url": "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES"
        },
        {
          "url": "https://github.com/apache/mina-sshd/issues/445"
        },
        {
          "url": "https://github.com/hierynomus/sshj/issues/916"
        },
        {
          "url": "https://github.com/janmojzis/tinyssh/issues/81"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/20/3"
        },
        {
          "url": "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2"
        },
        {
          "url": "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16"
        },
        {
          "name": "FEDORA-2023-0733306be9",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/"
        },
        {
          "name": "DSA-5586",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5586"
        },
        {
          "url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508"
        },
        {
          "url": "https://www.theregister.com/2023/12/20/terrapin_attack_ssh"
        },
        {
          "url": "https://filezilla-project.org/versions.php"
        },
        {
          "url": "https://nova.app/releases/#v11.8"
        },
        {
          "url": "https://roumenpetrov.info/secsh/#news20231220"
        },
        {
          "url": "https://www.vandyke.com/products/securecrt/history.txt"
        },
        {
          "url": "https://help.panic.com/releasenotes/transmit5/"
        },
        {
          "url": "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta"
        },
        {
          "url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2189"
        },
        {
          "url": "https://winscp.net/eng/docs/history#6.2.2"
        },
        {
          "url": "https://www.bitvise.com/ssh-client-version-history#933"
        },
        {
          "url": "https://github.com/cyd01/KiTTY/issues/520"
        },
        {
          "name": "DSA-5588",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5588"
        },
        {
          "url": "https://github.com/ssh-mitm/ssh-mitm/issues/165"
        },
        {
          "url": "https://news.ycombinator.com/item?id=38732005"
        },
        {
          "name": "[debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html"
        },
        {
          "name": "GLSA-202312-16",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202312-16"
        },
        {
          "name": "GLSA-202312-17",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202312-17"
        },
        {
          "name": "FEDORA-2023-20feb865d8",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/"
        },
        {
          "name": "FEDORA-2023-cb8c606fbb",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/"
        },
        {
          "name": "FEDORA-2023-e77300e4b5",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/"
        },
        {
          "name": "FEDORA-2023-b87ec6cf47",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/"
        },
        {
          "name": "FEDORA-2023-153404713b",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240105-0004/"
        },
        {
          "name": "FEDORA-2024-3bb23c77f3",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/"
        },
        {
          "name": "FEDORA-2023-55800423a8",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/"
        },
        {
          "name": "FEDORA-2024-d946b9ad25",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/"
        },
        {
          "name": "FEDORA-2024-71c2c6526c",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/"
        },
        {
          "name": "FEDORA-2024-39a8c72ea9",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/"
        },
        {
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002"
        },
        {
          "name": "FEDORA-2024-ae653fb07b",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
        },
        {
          "name": "FEDORA-2024-2705241461",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/"
        },
        {
          "name": "FEDORA-2024-fb32950d11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
        },
        {
          "name": "FEDORA-2024-7b08207cdb",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/"
        },
        {
          "name": "FEDORA-2024-06ebb70bdd",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/"
        },
        {
          "name": "[debian-lts-announce] 20240125 [SECURITY] [DLA 3718-1] php-phpseclib security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html"
        },
        {
          "name": "[debian-lts-announce] 20240125 [SECURITY] [DLA 3719-1] phpseclib security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html"
        },
        {
          "name": "FEDORA-2024-a53b24023d",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/"
        },
        {
          "name": "FEDORA-2024-3fd1bc9276",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/"
        },
        {
          "url": "https://support.apple.com/kb/HT214084"
        },
        {
          "name": "20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2024/Mar/21"
        },
        {
          "name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
        },
        {
          "name": "[oss-security] 20240417 Terrapin vulnerability in Jenkins CLI client",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2024/04/17/8"
        },
        {
          "name": "[oss-security] 20240306 Multiple vulnerabilities in Jenkins plugins",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-48795",
    "datePublished": "2023-12-18T00:00:00",
    "dateReserved": "2023-11-20T00:00:00",
    "dateUpdated": "2024-08-02T21:46:27.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2000-0143
Vulnerability from cvelistv5
Published
2000-02-16 05:00
Modified
2024-08-08 05:05
Severity ?
Summary
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:54.070Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T08:22:53",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0143",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0143",
    "datePublished": "2000-02-16T05:00:00",
    "dateReserved": "2000-02-16T00:00:00",
    "dateUpdated": "2024-08-08T05:05:54.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1473
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
Summary
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
References
http://www.kb.cert.org/vuls/id/684820third-party-advisory, x_refsource_CERT-VN
https://exchange.xforce.ibmcloud.com/vulnerabilities/6603vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.370Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#684820",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/684820"
          },
          {
            "name": "ssh-authentication-forwarding(6603)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6603"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target\u0027s public key, which allows the attacker to compute the corresponding private key and use the target\u0027s Session ID with the compromised key pair to masquerade as the target."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#684820",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/684820"
        },
        {
          "name": "ssh-authentication-forwarding(6603)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6603"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1473",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target\u0027s public key, which allows the attacker to compute the corresponding private key and use the target\u0027s Session ID with the compromised key pair to masquerade as the target."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#684820",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/684820"
            },
            {
              "name": "ssh-authentication-forwarding(6603)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6603"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1473",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0398
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:34
Severity ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:34:51.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T07:27:21",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0398",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0398",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:34:51.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1475
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
Summary
SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/6490vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/665372third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:10.876Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-rc4-replay-conversation(6490)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
          },
          {
            "name": "VU#665372",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/665372"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-rc4-replay-conversation(6490)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
        },
        {
          "name": "VU#665372",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/665372"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1475",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-rc4-replay-conversation(6490)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
            },
            {
              "name": "VU#665372",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/665372"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1475",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:10.876Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1715
Vulnerability from cvelistv5
Published
2005-06-21 04:00
Modified
2024-08-08 03:34
Severity ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/8908vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/4547vdb-entry, x_refsource_BID
http://online.securityfocus.com/archive/1/268446mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-bypass-restricted-shells(8908)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
          },
          {
            "name": "4547",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4547"
          },
          {
            "name": "20020418 Restricted Shells",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/268446"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-bypass-restricted-shells(8908)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
        },
        {
          "name": "4547",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4547"
        },
        {
          "name": "20020418 Restricted Shells",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/268446"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-bypass-restricted-shells(8908)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
            },
            {
              "name": "4547",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4547"
            },
            {
              "name": "20020418 Restricted Shells",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/268446"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1715",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2000-0575
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 05:21
Severity ?
Summary
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS.
References
http://www.securityfocus.com/bid/1426vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/4903vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=96256265914116&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.314Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1426",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1426"
          },
          {
            "name": "ssh-kerberos-tickets-disclosure(4903)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
          },
          {
            "name": "20000630 Kerberos security vulnerability in SSH-1.2.27",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=96256265914116\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1426",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1426"
        },
        {
          "name": "ssh-kerberos-tickets-disclosure(4903)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
        },
        {
          "name": "20000630 Kerberos security vulnerability in SSH-1.2.27",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=96256265914116\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0575",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1426",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1426"
            },
            {
              "name": "ssh-kerberos-tickets-disclosure(4903)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
            },
            {
              "name": "20000630 Kerberos security vulnerability in SSH-1.2.27",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=96256265914116\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0575",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.314Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2000-0217
Vulnerability from cvelistv5
Published
2000-04-10 04:00
Modified
2024-08-08 05:05
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
References
http://www.securityfocus.com/bid/1006vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:54.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1006",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1006"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-02-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1006",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1006"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1006",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1006"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0217",
    "datePublished": "2000-04-10T04:00:00",
    "dateReserved": "2000-03-22T00:00:00",
    "dateUpdated": "2024-08-08T05:05:54.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1474
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
Summary
SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/6604vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/786900third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.156Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-dns-authentication-bypass(6604)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6604"
          },
          {
            "name": "VU#786900",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/786900"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client\u0027s DNS cache."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-dns-authentication-bypass(6604)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6604"
        },
        {
          "name": "VU#786900",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/786900"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client\u0027s DNS cache."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-dns-authentication-bypass(6604)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6604"
            },
            {
              "name": "VU#786900",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/786900"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1474",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.156Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0471
Vulnerability from cvelistv5
Published
2001-05-24 04:00
Modified
2024-08-08 04:21
Severity ?
Summary
SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.
References
http://www.securityfocus.com/bid/2345vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/160648mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:21:38.166Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2345",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2345"
          },
          {
            "name": "20010205 SSHD-1 Logging Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/160648"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-05-08T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2345",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2345"
        },
        {
          "name": "20010205 SSHD-1 Logging Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/160648"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0471",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2345",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2345"
            },
            {
              "name": "20010205 SSHD-1 Logging Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/160648"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0471",
    "datePublished": "2001-05-24T04:00:00",
    "dateReserved": "2001-05-24T00:00:00",
    "dateUpdated": "2024-08-08T04:21:38.166Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0572
Vulnerability from cvelistv5
Published
2001-07-27 04:00
Modified
2024-08-08 04:21
Severity ?
Summary
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
References
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3vendor-advisory, x_refsource_MANDRAKE
http://www.redhat.com/support/errata/RHSA-2001-033.htmlvendor-advisory, x_refsource_REDHAT
http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.htmlmailing-list, x_refsource_BUGTRAQ
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000391vendor-advisory, x_refsource_CONECTIVA
http://www.kb.cert.org/vuls/id/596827third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:21:38.923Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2001:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3"
          },
          {
            "name": "RHSA-2001:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2001-033.html"
          },
          {
            "name": "20010318 Passive Analysis of SSH (Secure Shell) Traffic",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html"
          },
          {
            "name": "CLA-2001:391",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000391"
          },
          {
            "name": "VU#596827",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/596827"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-20T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDKSA-2001:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3"
        },
        {
          "name": "RHSA-2001:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2001-033.html"
        },
        {
          "name": "20010318 Passive Analysis of SSH (Secure Shell) Traffic",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html"
        },
        {
          "name": "CLA-2001:391",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000391"
        },
        {
          "name": "VU#596827",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/596827"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0572",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDKSA-2001:033",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3"
            },
            {
              "name": "RHSA-2001:033",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2001-033.html"
            },
            {
              "name": "20010318 Passive Analysis of SSH (Secure Shell) Traffic",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html"
            },
            {
              "name": "CLA-2001:391",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000391"
            },
            {
              "name": "VU#596827",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/596827"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0572",
    "datePublished": "2001-07-27T04:00:00",
    "dateReserved": "2001-07-27T00:00:00",
    "dateUpdated": "2024-08-08T04:21:38.923Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1470
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
Summary
The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/6472vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/315308third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.683Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-idea-modify-packets(6472)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6472"
          },
          {
            "name": "VU#315308",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/315308"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-idea-modify-packets(6472)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6472"
        },
        {
          "name": "VU#315308",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/315308"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1470",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-idea-modify-packets(6472)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6472"
            },
            {
              "name": "VU#315308",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/315308"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1470",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1469
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
Summary
The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message's cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/6449vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/25309third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-rc4-modify-packets(6449)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
          },
          {
            "name": "VU#25309",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/25309"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message\u0027s cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-rc4-modify-packets(6449)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
        },
        {
          "name": "VU#25309",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/25309"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1469",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message\u0027s cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-rc4-modify-packets(6449)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
            },
            {
              "name": "VU#25309",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/25309"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1469",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.406Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0144
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:06
Severity ?
Summary
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
References
http://www.securityfocus.com/bid/2347vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/6083vdb-entry, x_refsource_XF
http://www.osvdb.org/503vdb-entry, x_refsource_OSVDB
http://marc.info/?l=bugtraq&m=98168366406903&w=2mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/795vdb-entry, x_refsource_OSVDB
http://razor.bindview.com/publish/advisories/adv_ssh1crc.htmlvendor-advisory, x_refsource_BINDVIEW
http://www.cert.org/advisories/CA-2001-35.htmlthird-party-advisory, x_refsource_CERT
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:06:55.463Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2347",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2347"
          },
          {
            "name": "ssh-deattack-overwrite-memory(6083)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6083"
          },
          {
            "name": "503",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/503"
          },
          {
            "name": "20010208 [CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=98168366406903\u0026w=2"
          },
          {
            "name": "795",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/795"
          },
          {
            "name": "20010208 Remote vulnerability in SSH daemon crc32 compensation attack detector",
            "tags": [
              "vendor-advisory",
              "x_refsource_BINDVIEW",
              "x_transferred"
            ],
            "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
          },
          {
            "name": "CA-2001-35",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.cert.org/advisories/CA-2001-35.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-02-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-02T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2347",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2347"
        },
        {
          "name": "ssh-deattack-overwrite-memory(6083)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6083"
        },
        {
          "name": "503",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/503"
        },
        {
          "name": "20010208 [CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=98168366406903\u0026w=2"
        },
        {
          "name": "795",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/795"
        },
        {
          "name": "20010208 Remote vulnerability in SSH daemon crc32 compensation attack detector",
          "tags": [
            "vendor-advisory",
            "x_refsource_BINDVIEW"
          ],
          "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
        },
        {
          "name": "CA-2001-35",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.cert.org/advisories/CA-2001-35.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2347",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2347"
            },
            {
              "name": "ssh-deattack-overwrite-memory(6083)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6083"
            },
            {
              "name": "503",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/503"
            },
            {
              "name": "20010208 [CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=98168366406903\u0026w=2"
            },
            {
              "name": "795",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/795"
            },
            {
              "name": "20010208 Remote vulnerability in SSH daemon crc32 compensation attack detector",
              "refsource": "BINDVIEW",
              "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
            },
            {
              "name": "CA-2001-35",
              "refsource": "CERT",
              "url": "http://www.cert.org/advisories/CA-2001-35.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0144",
    "datePublished": "2001-05-07T04:00:00",
    "dateReserved": "2001-02-08T00:00:00",
    "dateUpdated": "2024-08-08T04:06:55.463Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0259
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:14
Severity ?
Summary
ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:14:07.166Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html"
          },
          {
            "name": "2222",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2222"
          },
          {
            "name": "20010116 Bug in SSH1 secure-RPC support can expose users\u0027 private keys",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0262.html"
          },
          {
            "name": "ssh-rpc-private-key(5963)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5963"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user\u0027s private key file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html"
        },
        {
          "name": "2222",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2222"
        },
        {
          "name": "20010116 Bug in SSH1 secure-RPC support can expose users\u0027 private keys",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0262.html"
        },
        {
          "name": "ssh-rpc-private-key(5963)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5963"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0259",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user\u0027s private key file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html"
            },
            {
              "name": "2222",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2222"
            },
            {
              "name": "20010116 Bug in SSH1 secure-RPC support can expose users\u0027 private keys",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0262.html"
            },
            {
              "name": "ssh-rpc-private-key(5963)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5963"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0259",
    "datePublished": "2001-05-07T04:00:00",
    "dateReserved": "2001-03-29T00:00:00",
    "dateUpdated": "2024-08-08T04:14:07.166Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0310
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:34
Severity ?
Summary
SSH 1.2.25 on HP-UX allows access to new user accounts.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:34:51.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH 1.2.25 on HP-UX allows access to new user accounts."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T07:14:36",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0310",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH 1.2.25 on HP-UX allows access to new user accounts."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0310",
    "datePublished": "1999-09-29T04:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:34:51.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1476
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
Summary
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/6490vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/565052third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.320Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-rc4-replay-conversation(6490)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
          },
          {
            "name": "VU#565052",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/565052"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH before 2.0, with RC4 encryption and the \"disallow NULL passwords\" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-rc4-replay-conversation(6490)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
        },
        {
          "name": "VU#565052",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/565052"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1476",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH before 2.0, with RC4 encryption and the \"disallow NULL passwords\" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-rc4-replay-conversation(6490)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
            },
            {
              "name": "VU#565052",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/565052"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1476",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.320Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0787
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-01 16:48
Severity ?
Summary
The SSH authentication agent follows symlinks via a UNIX domain socket.
References
http://marc.info/?l=bugtraq&m=93760201002154&w=2mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/660vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=93832856804415&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:48:38.126Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19990917 A few bugs...",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=93760201002154\u0026w=2"
          },
          {
            "name": "660",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/660"
          },
          {
            "name": "19990924 [Fwd: Truth about ssh 1.2.27 vulnerability]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=93832856804415\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSH authentication agent follows symlinks via a UNIX domain socket."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19990917 A few bugs...",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=93760201002154\u0026w=2"
        },
        {
          "name": "660",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/660"
        },
        {
          "name": "19990924 [Fwd: Truth about ssh 1.2.27 vulnerability]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=93832856804415\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0787",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSH authentication agent follows symlinks via a UNIX domain socket."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19990917 A few bugs...",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=93760201002154\u0026w=2"
            },
            {
              "name": "660",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/660"
            },
            {
              "name": "19990924 [Fwd: Truth about ssh 1.2.27 vulnerability]",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=93832856804415\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0787",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "1999-11-25T00:00:00",
    "dateUpdated": "2024-08-01T16:48:38.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0013
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 19:02
Summary
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:27:56.463Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ssh",
            "vendor": "ssh",
            "versions": [
              {
                "status": "affected",
                "version": "1.2.0"
              },
              {
                "status": "affected",
                "version": "1.2.1"
              },
              {
                "status": "affected",
                "version": "1.2.2"
              },
              {
                "status": "affected",
                "version": "1.2.3"
              },
              {
                "status": "affected",
                "version": "1.2.4"
              },
              {
                "status": "affected",
                "version": "1.2.5"
              },
              {
                "status": "affected",
                "version": "1.2.6"
              },
              {
                "status": "affected",
                "version": "1.2.7"
              },
              {
                "status": "affected",
                "version": "1.2.8"
              },
              {
                "status": "affected",
                "version": "1.2.9"
              },
              {
                "status": "affected",
                "version": "1.2.10"
              },
              {
                "status": "affected",
                "version": "1.2.11"
              },
              {
                "status": "affected",
                "version": "1.2.12"
              },
              {
                "status": "affected",
                "version": "1.2.13"
              },
              {
                "status": "affected",
                "version": "1.2.14"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-1999-0013",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-01T18:59:12.970313Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-522",
                "description": "CWE-522 Insufficiently Protected Credentials",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:02:44.132Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T06:24:59",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0013",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0013",
    "datePublished": "1999-09-29T04:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T19:02:44.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0766
Vulnerability from cvelistv5
Published
2011-05-31 20:00
Modified
2024-09-17 04:29
Severity ?
Summary
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
References
http://secunia.com/advisories/44709third-party-advisory, x_refsource_SECUNIA
https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5x_refsource_CONFIRM
http://www.securityfocus.com/bid/47980vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/178990third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:05:53.431Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "44709",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44709"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5"
          },
          {
            "name": "47980",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47980"
          },
          {
            "name": "VU#178990",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/178990"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-05-31T20:00:00Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "44709",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44709"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5"
        },
        {
          "name": "47980",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47980"
        },
        {
          "name": "VU#178990",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/178990"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2011-0766",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "44709",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44709"
            },
            {
              "name": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5",
              "refsource": "CONFIRM",
              "url": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5"
            },
            {
              "name": "47980",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47980"
            },
            {
              "name": "VU#178990",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/178990"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2011-0766",
    "datePublished": "2011-05-31T20:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-17T04:29:25.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0361
Vulnerability from cvelistv5
Published
2001-09-18 04:00
Modified
2024-08-08 04:14
Severity ?
Summary
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
References
http://www.securityfocus.com/bid/2344vdb-entry, x_refsource_BID
http://www.osvdb.org/2116vdb-entry, x_refsource_OSVDB
http://www.debian.org/security/2001/dsa-027vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2001/dsa-023vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/6082vdb-entry, x_refsource_XF
http://www.ciac.org/ciac/bulletins/l-047.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.debian.org/security/2001/dsa-086vendor-advisory, x_refsource_DEBIAN
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.ascvendor-advisory, x_refsource_FREEBSD
http://marc.info/?l=bugtraq&m=98158450021686&w=2mailing-list, x_refsource_BUGTRAQ
http://www.novell.com/linux/security/advisories/adv004_ssh.htmlvendor-advisory, x_refsource_SUSE
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:14:07.435Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2344",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2344"
          },
          {
            "name": "2116",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/2116"
          },
          {
            "name": "DSA-027",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2001/dsa-027"
          },
          {
            "name": "DSA-023",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2001/dsa-023"
          },
          {
            "name": "ssh-session-key-recovery(6082)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6082"
          },
          {
            "name": "L-047",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/l-047.shtml"
          },
          {
            "name": "DSA-086",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2001/dsa-086"
          },
          {
            "name": "FreeBSD-SA-01:24",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc"
          },
          {
            "name": "20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=98158450021686\u0026w=2"
          },
          {
            "name": "SuSE-SA:2001:04",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/adv004_ssh.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-02-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a \"Bleichenbacher attack\" on PKCS#1 version 1.5."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-02T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2344",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2344"
        },
        {
          "name": "2116",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/2116"
        },
        {
          "name": "DSA-027",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2001/dsa-027"
        },
        {
          "name": "DSA-023",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2001/dsa-023"
        },
        {
          "name": "ssh-session-key-recovery(6082)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6082"
        },
        {
          "name": "L-047",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/l-047.shtml"
        },
        {
          "name": "DSA-086",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2001/dsa-086"
        },
        {
          "name": "FreeBSD-SA-01:24",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc"
        },
        {
          "name": "20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=98158450021686\u0026w=2"
        },
        {
          "name": "SuSE-SA:2001:04",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/adv004_ssh.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0361",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a \"Bleichenbacher attack\" on PKCS#1 version 1.5."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2344",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2344"
            },
            {
              "name": "2116",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/2116"
            },
            {
              "name": "DSA-027",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2001/dsa-027"
            },
            {
              "name": "DSA-023",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2001/dsa-023"
            },
            {
              "name": "ssh-session-key-recovery(6082)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6082"
            },
            {
              "name": "L-047",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/l-047.shtml"
            },
            {
              "name": "DSA-086",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2001/dsa-086"
            },
            {
              "name": "FreeBSD-SA-01:24",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc"
            },
            {
              "name": "20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=98158450021686\u0026w=2"
            },
            {
              "name": "SuSE-SA:2001:04",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/adv004_ssh.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0361",
    "datePublished": "2001-09-18T04:00:00",
    "dateReserved": "2001-05-24T00:00:00",
    "dateUpdated": "2024-08-08T04:14:07.435Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0248
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-01 16:34
Severity ?
Summary
A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:34:51.869Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user\u0027s credentials."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0248",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user\u0027s credentials."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html",
              "refsource": "MISC",
              "url": "http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html"
            },
            {
              "name": "http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1",
              "refsource": "CONFIRM",
              "url": "http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0248",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:34:51.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2001-01-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.
Impacted products
Vendor Product Version
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH before 2.0, with RC4 encryption and the \"disallow NULL passwords\" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not."
    }
  ],
  "id": "CVE-2001-1476",
  "lastModified": "2024-11-20T23:37:47.110",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/565052"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/565052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-02-24 05:00
Modified
2024-11-20 23:31
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Impacted products
Vendor Product Version
openbsd openssh 1.2
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
    }
  ],
  "id": "CVE-2000-0217",
  "lastModified": "2024-11-20T23:31:59.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2000-02-24T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/1006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/1006"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-12-19 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Impacted products
Vendor Product Version
openbsd openssh 1.2
openbsd openssh 1.2.3
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA997F5E-29FE-454A-9006-001D732CD4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack."
    }
  ],
  "id": "CVE-2000-0992",
  "lastModified": "2024-11-20T23:33:45.513",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-12-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1742"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0359.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2000:057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5312"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1998-09-01 04:00
Modified
2024-11-20 23:28
Severity ?
Summary
SSH 1.2.25 on HP-UX allows access to new user accounts.
Impacted products
Vendor Product Version
ssh ssh 1.2.25



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 1.2.25 on HP-UX allows access to new user accounts."
    }
  ],
  "id": "CVE-1999-0310",
  "lastModified": "2024-11-20T23:28:23.560",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1998-09-01T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-01-01 05:00
Modified
2024-11-20 23:28
Severity ?
Summary
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
Impacted products
Vendor Product Version
ssh ssh 1.2.27
ssh ssh2 2.0.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."
    }
  ],
  "id": "CVE-1999-0398",
  "lastModified": "2024-11-20T23:28:38.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-01-01T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1998-01-22 05:00
Modified
2024-11-20 23:27
Summary
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
Impacted products
Vendor Product Version
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user."
    }
  ],
  "id": "CVE-1999-0013",
  "lastModified": "2024-11-20T23:27:36.573",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "1998-01-22T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-09-17 04:00
Modified
2024-11-20 23:29
Severity ?
Summary
The SSH authentication agent follows symlinks via a UNIX domain socket.
Impacted products
Vendor Product Version
ssh ssh 1.2.27



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH authentication agent follows symlinks via a UNIX domain socket."
    }
  ],
  "id": "CVE-1999-0787",
  "lastModified": "2024-11-20T23:29:28.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-09-17T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=93760201002154\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=93832856804415\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=93760201002154\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=93832856804415\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/660"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-02-11 05:00
Modified
2024-11-20 23:31
Severity ?
Summary
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
Impacted products
Vendor Product Version
openbsd openssh *
openbsd openssh 1.2
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EFC03C-F5A7-4B74-B664-5828763B3E8E",
              "versionEndIncluding": "1.2.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP."
    }
  ],
  "id": "CVE-2000-0143",
  "lastModified": "2024-11-20T23:31:48.923",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-02-11T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-06-02 04:00
Modified
2024-11-20 23:34
Severity ?
Summary
ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.
Impacted products
Vendor Product Version
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user\u0027s private key file."
    }
  ],
  "id": "CVE-2001-0259",
  "lastModified": "2024-11-20T23:34:58.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0262.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2222"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0262.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.ssh.com/products/ssh/patches/secureRPCvulnerability.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5963"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-31 20:55
Modified
2024-11-21 01:24
Severity ?
Summary
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:erlang:crypto:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5C36D51-22EA-4973-BD37-34A148222677",
              "versionEndIncluding": "2.0.2.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r11b-5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83FC35B-457E-461C-939A-2A2DAB1C2461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r12b-5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6C511C8-EE7D-4E4F-829A-8A28A3F5DE7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBDFE1E-0212-4A40-AF37-452469A591DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b02-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90FCA4F4-F172-44F8-A7E9-03C4374D8BE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b03:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E2E62B-42A6-4D2C-80D0-B1AFD8F24E4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r13b04:*:*:*:*:*:*:*",
              "matchCriteriaId": "586A5C8B-0842-4D1C-A33A-A5E4AB0F7422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D07E19-8830-4112-993B-92475F37CB68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14b:*:*:*:*:*:*:*",
              "matchCriteriaId": "13DF6614-88C8-49CE-97E3-0AD2D3972182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14b01:*:*:*:*:*:*:*",
              "matchCriteriaId": "10182FC9-2DE9-4FAD-8C9D-D5B21A735824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:r14b02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4106F0A1-8582-46CD-9F8F-1A613B272DF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5FC28F2-797D-4C4E-B9B8-D89A3AAD7950",
              "versionEndIncluding": "2.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys."
    },
    {
      "lang": "es",
      "value": "El generador de n\u00fameros aleatorios de la aplicaci\u00f3n Crypto en versiones anteriores a la 2.0.2.2, y SSH anteriores a 2.0.5, como es usado en la librer\u00eda Erlang/OTP ssh en versiones anteriores a la R14B03, utiliza semillas predecibles basadas en la fecha actual, lo que facilita a atacantes remotos adivinar el host DSA y las claves de sesi\u00f3n SSH."
    }
  ],
  "id": "CVE-2011-0766",
  "lastModified": "2024-11-21T01:24:47.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-31T20:55:01.780",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44709"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/178990"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/47980"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/178990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/47980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-01-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message.
Impacted products
Vendor Product Version
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message."
    }
  ],
  "id": "CVE-2001-1470",
  "lastModified": "2024-11-20T23:37:46.263",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/315308"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/315308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6472"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-01-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated.
Impacted products
Vendor Product Version
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated."
    }
  ],
  "id": "CVE-2001-1475",
  "lastModified": "2024-11-20T23:37:46.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/665372"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/665372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-06-27 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack.
Impacted products
Vendor Product Version
ssh ssh *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7E8D03-737F-4751-9663-39F86F23B21F",
              "versionEndIncluding": "1.2.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH daemon version 1 (aka SSHD-1 or SSH-1) 1.2.30 and earlier does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack."
    }
  ],
  "id": "CVE-2001-0471",
  "lastModified": "2024-11-20T23:35:26.887",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/160648"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/160648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2345"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-03-12 05:00
Modified
2024-11-20 23:34
Severity ?
Summary
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
Impacted products
Vendor Product Version
openbsd openssh 1.2.2
openbsd openssh 1.2.3
openbsd openssh 2.1
openbsd openssh 2.1.1
openbsd openssh 2.2
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E307F1-C765-409C-835C-133026A5179C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA997F5E-29FE-454A-9006-001D732CD4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78135400-BA1A-42AA-BE17-5588442BCF11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow."
    }
  ],
  "id": "CVE-2001-0144",
  "lastModified": "2024-11-20T23:34:42.410",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-03-12T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=98168366406903\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.cert.org/advisories/CA-2001-35.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/795"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2347"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=98168366406903\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.cert.org/advisories/CA-2001-35.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6083"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-12-18 16:15
Modified
2024-12-02 14:54
Summary
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
References
cve@mitre.orghttp://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2024/Mar/21Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/12/18/3Mailing List
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/12/19/5Mailing List
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2023/12/20/3Mailing List, Mitigation
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2024/03/06/3Mailing List
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2024/04/17/8Mailing List
cve@mitre.orghttps://access.redhat.com/security/cve/cve-2023-48795Third Party Advisory
cve@mitre.orghttps://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/Press/Media Coverage
cve@mitre.orghttps://bugs.gentoo.org/920280Issue Tracking
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=2254210Issue Tracking
cve@mitre.orghttps://bugzilla.suse.com/show_bug.cgi?id=1217950Issue Tracking
cve@mitre.orghttps://crates.io/crates/thrussh/versionsRelease Notes
cve@mitre.orghttps://filezilla-project.org/versions.phpRelease Notes
cve@mitre.orghttps://forum.netgate.com/topic/184941/terrapin-ssh-attackIssue Tracking
cve@mitre.orghttps://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6Patch
cve@mitre.orghttps://github.com/NixOS/nixpkgs/pull/275249Release Notes
cve@mitre.orghttps://github.com/PowerShell/Win32-OpenSSH/issues/2189Issue Tracking
cve@mitre.orghttps://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-BetaRelease Notes
cve@mitre.orghttps://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0Patch
cve@mitre.orghttps://github.com/TeraTermProject/teraterm/releases/tag/v5.1Release Notes
cve@mitre.orghttps://github.com/advisories/GHSA-45x7-px36-x8w8Third Party Advisory
cve@mitre.orghttps://github.com/apache/mina-sshd/issues/445Issue Tracking
cve@mitre.orghttps://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173abPatch
cve@mitre.orghttps://github.com/connectbot/sshlib/compare/2.2.21...2.2.22Third Party Advisory
cve@mitre.orghttps://github.com/cyd01/KiTTY/issues/520Issue Tracking
cve@mitre.orghttps://github.com/drakkan/sftpgo/releases/tag/v2.5.6Release Notes
cve@mitre.orghttps://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42Patch
cve@mitre.orghttps://github.com/erlang/otp/releases/tag/OTP-26.2.1Release Notes
cve@mitre.orghttps://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05dPatch
cve@mitre.orghttps://github.com/hierynomus/sshj/issues/916Issue Tracking
cve@mitre.orghttps://github.com/janmojzis/tinyssh/issues/81Issue Tracking
cve@mitre.orghttps://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5Patch
cve@mitre.orghttps://github.com/libssh2/libssh2/pull/1291Mitigation
cve@mitre.orghttps://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25Patch
cve@mitre.orghttps://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3Patch
cve@mitre.orghttps://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15Product
cve@mitre.orghttps://github.com/mwiede/jsch/issues/457Issue Tracking
cve@mitre.orghttps://github.com/mwiede/jsch/pull/461Release Notes
cve@mitre.orghttps://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16Patch
cve@mitre.orghttps://github.com/openssh/openssh-portable/commits/masterPatch
cve@mitre.orghttps://github.com/paramiko/paramiko/issues/2337Issue Tracking
cve@mitre.orghttps://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTESRelease Notes
cve@mitre.orghttps://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTESRelease Notes
cve@mitre.orghttps://github.com/proftpd/proftpd/blob/master/RELEASE_NOTESRelease Notes
cve@mitre.orghttps://github.com/proftpd/proftpd/issues/456Issue Tracking
cve@mitre.orghttps://github.com/rapier1/hpn-ssh/releasesRelease Notes
cve@mitre.orghttps://github.com/ronf/asyncssh/blob/develop/docs/changes.rstRelease Notes
cve@mitre.orghttps://github.com/ronf/asyncssh/tagsRelease Notes
cve@mitre.orghttps://github.com/ssh-mitm/ssh-mitm/issues/165Issue Tracking
cve@mitre.orghttps://github.com/warp-tech/russh/releases/tag/v0.40.2Release Notes
cve@mitre.orghttps://gitlab.com/libssh/libssh-mirror/-/tagsRelease Notes
cve@mitre.orghttps://groups.google.com/g/golang-announce/c/-n5WqVC18LQMailing List
cve@mitre.orghttps://groups.google.com/g/golang-announce/c/qA3XtxvMUygMailing List
cve@mitre.orghttps://help.panic.com/releasenotes/transmit5/Release Notes
cve@mitre.orghttps://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/Press/Media Coverage
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlMailing List
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/Mailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/Vendor Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/Mailing List, Third Party Advisory
cve@mitre.orghttps://matt.ucc.asn.au/dropbear/CHANGESRelease Notes
cve@mitre.orghttps://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQCPatch
cve@mitre.orghttps://news.ycombinator.com/item?id=38684904Issue Tracking
cve@mitre.orghttps://news.ycombinator.com/item?id=38685286Issue Tracking
cve@mitre.orghttps://news.ycombinator.com/item?id=38732005Issue Tracking
cve@mitre.orghttps://nova.app/releases/#v11.8Release Notes
cve@mitre.orghttps://oryx-embedded.com/download/#changelogRelease Notes
cve@mitre.orghttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002Third Party Advisory
cve@mitre.orghttps://roumenpetrov.info/secsh/#news20231220Release Notes
cve@mitre.orghttps://security-tracker.debian.org/tracker/CVE-2023-48795Vendor Advisory
cve@mitre.orghttps://security-tracker.debian.org/tracker/source-package/libssh2Vendor Advisory
cve@mitre.orghttps://security-tracker.debian.org/tracker/source-package/proftpd-dfsgVendor Advisory
cve@mitre.orghttps://security-tracker.debian.org/tracker/source-package/trilead-ssh2Issue Tracking
cve@mitre.orghttps://security.gentoo.org/glsa/202312-16Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202312-17Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20240105-0004/Third Party Advisory
cve@mitre.orghttps://support.apple.com/kb/HT214084Third Party Advisory
cve@mitre.orghttps://thorntech.com/cve-2023-48795-and-sftp-gateway/Third Party Advisory
cve@mitre.orghttps://twitter.com/TrueSkrillor/status/1736774389725565005Press/Media Coverage
cve@mitre.orghttps://ubuntu.com/security/CVE-2023-48795Vendor Advisory
cve@mitre.orghttps://winscp.net/eng/docs/history#6.2.2Release Notes
cve@mitre.orghttps://www.bitvise.com/ssh-client-version-history#933Release Notes
cve@mitre.orghttps://www.bitvise.com/ssh-server-version-historyRelease Notes
cve@mitre.orghttps://www.chiark.greenend.org.uk/~sgtatham/putty/changes.htmlRelease Notes
cve@mitre.orghttps://www.crushftp.com/crush10wiki/Wiki.jsp?page=UpdateRelease Notes
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5586Issue Tracking
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5588Issue Tracking
cve@mitre.orghttps://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.ascRelease Notes
cve@mitre.orghttps://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508Vendor Advisory
cve@mitre.orghttps://www.netsarang.com/en/xshell-update-history/Release Notes
cve@mitre.orghttps://www.openssh.com/openbsd.htmlRelease Notes
cve@mitre.orghttps://www.openssh.com/txt/release-9.6Release Notes
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2023/12/18/2Mailing List
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2023/12/20/3Mailing List, Mitigation
cve@mitre.orghttps://www.paramiko.org/changelog.htmlRelease Notes
cve@mitre.orghttps://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/Issue Tracking
cve@mitre.orghttps://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/Press/Media Coverage
cve@mitre.orghttps://www.terrapin-attack.comExploit
cve@mitre.orghttps://www.theregister.com/2023/12/20/terrapin_attack_sshPress/Media Coverage
cve@mitre.orghttps://www.vandyke.com/products/securecrt/history.txtRelease Notes
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2024/Mar/21Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/12/18/3Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/12/19/5Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/12/20/3Mailing List, Mitigation
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2024/03/06/3Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2024/04/17/8Mailing List
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/cve-2023-48795Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/Press/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://bugs.gentoo.org/920280Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2254210Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.suse.com/show_bug.cgi?id=1217950Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://crates.io/crates/thrussh/versionsRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://filezilla-project.org/versions.phpRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://forum.netgate.com/topic/184941/terrapin-ssh-attackIssue Tracking
af854a3a-2127-422b-91ae-364da2661108https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/NixOS/nixpkgs/pull/275249Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/PowerShell/Win32-OpenSSH/issues/2189Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-BetaRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/TeraTermProject/teraterm/releases/tag/v5.1Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/advisories/GHSA-45x7-px36-x8w8Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/apache/mina-sshd/issues/445Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173abPatch
af854a3a-2127-422b-91ae-364da2661108https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/cyd01/KiTTY/issues/520Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/drakkan/sftpgo/releases/tag/v2.5.6Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/erlang/otp/releases/tag/OTP-26.2.1Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05dPatch
af854a3a-2127-422b-91ae-364da2661108https://github.com/hierynomus/sshj/issues/916Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/janmojzis/tinyssh/issues/81Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/libssh2/libssh2/pull/1291Mitigation
af854a3a-2127-422b-91ae-364da2661108https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/mwiede/jsch/issues/457Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/mwiede/jsch/pull/461Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/openssh/openssh-portable/commits/masterPatch
af854a3a-2127-422b-91ae-364da2661108https://github.com/paramiko/paramiko/issues/2337Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTESRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTESRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTESRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/proftpd/proftpd/issues/456Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/rapier1/hpn-ssh/releasesRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/ronf/asyncssh/blob/develop/docs/changes.rstRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/ronf/asyncssh/tagsRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/ssh-mitm/ssh-mitm/issues/165Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/warp-tech/russh/releases/tag/v0.40.2Release Notes
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/libssh/libssh-mirror/-/tagsRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/g/golang-announce/c/-n5WqVC18LQMailing List
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/g/golang-announce/c/qA3XtxvMUygMailing List
af854a3a-2127-422b-91ae-364da2661108https://help.panic.com/releasenotes/transmit5/Release Notes
af854a3a-2127-422b-91ae-364da2661108https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/Press/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/12/msg00017.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/01/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/01/msg00014.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/04/msg00016.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://matt.ucc.asn.au/dropbear/CHANGESRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQCPatch
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=38684904Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=38685286Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=38732005Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://nova.app/releases/#v11.8Release Notes
af854a3a-2127-422b-91ae-364da2661108https://oryx-embedded.com/download/#changelogRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://roumenpetrov.info/secsh/#news20231220Release Notes
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/CVE-2023-48795Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/source-package/libssh2Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/source-package/proftpd-dfsgVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/source-package/trilead-ssh2Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202312-16Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202312-17Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240105-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/kb/HT214084Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://thorntech.com/cve-2023-48795-and-sftp-gateway/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://twitter.com/TrueSkrillor/status/1736774389725565005Press/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://ubuntu.com/security/CVE-2023-48795Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://winscp.net/eng/docs/history#6.2.2Release Notes
af854a3a-2127-422b-91ae-364da2661108https://www.bitvise.com/ssh-client-version-history#933Release Notes
af854a3a-2127-422b-91ae-364da2661108https://www.bitvise.com/ssh-server-version-historyRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.htmlRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://www.crushftp.com/crush10wiki/Wiki.jsp?page=UpdateRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5586Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5588Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.ascRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.netsarang.com/en/xshell-update-history/Release Notes
af854a3a-2127-422b-91ae-364da2661108https://www.openssh.com/openbsd.htmlRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://www.openssh.com/txt/release-9.6Release Notes
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2023/12/18/2Mailing List
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2023/12/20/3Mailing List, Mitigation
af854a3a-2127-422b-91ae-364da2661108https://www.paramiko.org/changelog.htmlRelease Notes
af854a3a-2127-422b-91ae-364da2661108https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/Press/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://www.terrapin-attack.comExploit
af854a3a-2127-422b-91ae-364da2661108https://www.theregister.com/2023/12/20/terrapin_attack_sshPress/Media Coverage
af854a3a-2127-422b-91ae-364da2661108https://www.vandyke.com/products/securecrt/history.txtRelease Notes
Impacted products
Vendor Product Version
openbsd openssh *
putty putty *
filezilla-project filezilla_client *
microsoft powershell *
apple macos -
panic transmit_5 *
apple macos -
panic nova *
roumenpetrov pkixssh *
winscp winscp *
bitvise ssh_client *
bitvise ssh_server *
lancom-systems lcos *
lancom-systems lcos_fx -
lancom-systems lcos_lx -
lancom-systems lcos_sx 4.20
lancom-systems lcos_sx 5.20
lancom-systems lanconfig -
vandyke securecrt *
libssh libssh *
net-ssh net-ssh 7.2.0
ssh2_project ssh2 *
proftpd proftpd *
freebsd freebsd *
crates thrussh *
tera_term_project tera_term *
oryx-embedded cyclone_ssh *
crushftp crushftp *
netsarang xshell_7 *
paramiko paramiko *
redhat openshift_container_platform 4.0
redhat openstack_platform 16.1
redhat openstack_platform 16.2
redhat openstack_platform 17.1
redhat ceph_storage 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat openshift_serverless -
redhat openshift_gitops -
redhat openshift_pipelines -
redhat openshift_developer_tools_and_services -
redhat openshift_data_foundation 4.0
redhat openshift_api_for_data_protection -
redhat openshift_virtualization 4
redhat storage 3.0
redhat discovery -
redhat openshift_dev_spaces -
redhat cert-manager_operator_for_red_hat_openshift -
redhat keycloak -
redhat jboss_enterprise_application_platform 7.0
redhat single_sign-on 7.0
redhat advanced_cluster_security 3.0
redhat advanced_cluster_security 4.0
golang crypto *
russh_project russh *
sftpgo_project sftpgo *
erlang erlang\/otp *
matez jsch *
libssh2 libssh2 *
asyncssh_project asyncssh *
dropbear_ssh_project dropbear_ssh *
jadaptive maverick_synergy_java_ssh_api *
ssh ssh *
thorntech sftp_gateway_firmware *
netgate pfsense_plus *
netgate pfsense_ce *
crushftp crushftp *
connectbot sshlib *
apache sshd *
apache sshj *
tinyssh tinyssh *
trilead ssh2 6401
9bis kitty *
gentoo security -
debian debian_linux -
fedoraproject fedora 38
fedoraproject fedora 39
debian debian_linux 10.0
apple macos *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5308FBBB-F738-41C5-97A4-E40118E957CD",
              "versionEndExcluding": "9.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D807DB-9E20-4792-8A9F-4BFFC841BAB7",
              "versionEndExcluding": "0.80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42915485-A4DA-48DD-9C15-415D2D39DC52",
              "versionEndExcluding": "3.66.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F37C9AC-185F-403A-A79B-2D5C8E11AFC4",
              "versionEndIncluding": "11.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31FFE0AA-FC25-40DE-8EE9-7F4C80ABDE4F",
              "versionEndExcluding": "5.10.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2FCF7EF-97D7-44CF-AC74-72D856901755",
              "versionEndExcluding": "11.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53CAD263-1C60-43BD-86A2-C8DB15FFB4C6",
              "versionEndExcluding": "14.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA57F20-C9C1-40A7-B2CD-F3440CCF1D66",
              "versionEndExcluding": "6.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6209E375-10C7-4E65-A2E7-455A686717AC",
              "versionEndExcluding": "9.33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A05CC3C-19C5-4BAA-ABA2-EE1795E0BE81",
              "versionEndExcluding": "9.32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A71B523-0778-46C6-A38B-64452E0BB6E7",
              "versionEndIncluding": "3.66.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C91308-15E5-40AF-B4D5-3CAD7BC65DDF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "418940E3-6DD1-4AA6-846A-03E059D0C681",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "411BA58A-33B6-44CA-B9D6-7F9042D46961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA17A153-30E4-4731-8706-8F74FCA50993",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB736F57-9BE3-4457-A10E-FA88D0932154",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB8D02D-87F3-414D-A3EA-43F594DAAC1B",
              "versionEndExcluding": "9.4.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB481DA-FBFE-4CC2-9AE7-22025FA07494",
              "versionEndExcluding": "0.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*",
              "matchCriteriaId": "3D6FD459-F8E8-4126-8097-D30B4639404A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*",
              "matchCriteriaId": "69510F52-C699-4E7D-87EF-7000682888F0",
              "versionEndIncluding": "1.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9461430B-3709-45B6-8858-2101F5AE4481",
              "versionEndIncluding": "1.3.8b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A01DF3-E20E-4F29-B5CF-DDF717D01E74",
              "versionEndIncluding": "12.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D25EB73D-6145-4B7D-8F14-80FD0B458E99",
              "versionEndExcluding": "0.35.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77594DEC-B5F7-4911-A13D-FFE91C74BAFA",
              "versionEndIncluding": "5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FF7E74-2351-4CD9-B717-FA28893293A1",
              "versionEndExcluding": "2.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A93C12-FEB6-4E82-B283-0ED7820D807E",
              "versionEndIncluding": "10.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B480AE79-2FA1-4281-9F0D-0DE812B9354D",
              "versionEndExcluding": "build__0144",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "826B6323-06F8-4B96-8771-3FA15A727B08",
              "versionEndExcluding": "3.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCC81071-B46D-4F5D-AC25-B4A4CCC20C73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315FC5C-FF19-43C9-A58A-CF2A5FF13824",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7EAD12-E398-44AF-9859-F3CA6C63BA6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77675CB7-67D7-44E9-B7FF-D224B3341AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AAA300-691A-4957-8B69-F6888CC971B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45937289-2D64-47CB-A750-5B4F0D4664A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97321212-0E07-4CC2-A917-7B5F61AB9A5A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E2C021C-A9F0-4EB4-ADED-81D8B57B4563",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BF8EFFB-5686-4F28-A68F-1A8854E098CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C877879-B84B-471C-80CF-0656521CA8AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B1D946-5978-4818-BF21-A43D9C1365E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5A7736-A403-4617-8790-18E46CB74DA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0DE4E1-5D8D-40F3-8AC8-C7F736966158",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88BF3B2C-B121-483A-AEF2-8082F6DA5310",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FD736A-8730-446A-BA3A-7B608DB62B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C504B6-3902-46E2-82B7-48AEC9CDD48D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F92E56DF-98DF-4328-B37E-4D5744E4103D",
              "versionEndExcluding": "0.17.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*",
              "matchCriteriaId": "AC12508E-3C31-44EA-B4F3-29316BE9B189",
              "versionEndExcluding": "0.40.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1750028C-698D-4E84-B727-8A155A46ADEB",
              "versionEndExcluding": "2.5.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A9A8E99-7F4A-4B74-B86B-8B3E8B2A8776",
              "versionEndExcluding": "26.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:matez:jsch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61119DB3-4336-4D3B-863A-0CCF4146E5C1",
              "versionEndExcluding": "0.2.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFDD272-3DF0-4E3F-B69A-E7ABF4B18B24",
              "versionEndExcluding": "1.11.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asyncssh_project:asyncssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAE46983-0ABC-49F7-AC18-A78FAC7E73AA",
              "versionEndExcluding": "2.14.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06BF3368-F232-4E6B-883E-A591EED5C827",
              "versionEndExcluding": "2022.83",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:jadaptive:maverick_synergy_java_ssh_api:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36531FB6-5682-4BF1-9785-E9D6D1C4207B",
              "versionEndExcluding": "3.1.0-snapshot",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "514ED687-0D7B-479B-82C5-7EB1A5EEC94C",
              "versionEndExcluding": "5.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:thorntech:sftp_gateway_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83B1AF39-C0B9-4031-B19A-BDDD4F337273",
              "versionEndExcluding": "3.4.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B71B0EF-888E-45E2-A055-F59CDCC1AFC7",
              "versionEndIncluding": "23.09.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F23CDF7-2881-4B4E-B84F-4E04F4ED8CCF",
              "versionEndIncluding": "2.7.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1795F7A-203F-400E-B09C-0FAF16D01CFC",
              "versionEndExcluding": "10.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:connectbot:sshlib:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D79DDDD-02F0-4C12-BE7F-1B9DF1722C7A",
              "versionEndExcluding": "2.2.22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:sshd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D7B0CA-C01F-4296-9425-48299E3889C5",
              "versionEndIncluding": "2.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:sshj:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C3EB0B8-9E76-4146-AB02-02E20B91D55C",
              "versionEndIncluding": "0.37.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tinyssh:tinyssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0582468A-149B-429F-978A-2AEDF4BE2606",
              "versionEndIncluding": "20230101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:trilead:ssh2:6401:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4BAF06-5A79-46D7-8C4F-E670BD6B7C2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:9bis:kitty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98321BF9-5E8F-4836-842C-47713B1C2775",
              "versionEndIncluding": "0.76.1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gentoo:security:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76BDAFDE-4515-42E6-820F-38AF4A786CF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5920923E-0D52-44E5-801D-10B82846ED58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099",
              "versionEndExcluding": "14.4",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust."
    },
    {
      "lang": "es",
      "value": "El protocolo de transporte SSH con ciertas extensiones OpenSSH, que se encuentra en OpenSSH anterior a 9.6 y otros productos, permite a atacantes remotos eludir las comprobaciones de integridad de modo que algunos paquetes se omiten (del mensaje de negociaci\u00f3n de extensi\u00f3n) y, en consecuencia, un cliente y un servidor pueden terminar con una conexi\u00f3n para la cual algunas caracter\u00edsticas de seguridad han sido degradadas o deshabilitadas, tambi\u00e9n conocido como un ataque Terrapin. Esto ocurre porque SSH Binary Packet Protocol (BPP), implementado por estas extensiones, maneja mal la fase de protocolo de enlace y el uso de n\u00fameros de secuencia. Por ejemplo, existe un ataque eficaz contra ChaCha20-Poly1305 (y CBC con Encrypt-then-MAC). La omisi\u00f3n se produce en chacha20-poly1305@openssh.com y (si se utiliza CBC) en los algoritmos MAC -etm@openssh.com. Esto tambi\u00e9n afecta a Maverick Synergy Java SSH API anterior a 3.1.0-SNAPSHOT, Dropbear hasta 2022.83, Ssh anterior a 5.1.1 en Erlang/OTP, PuTTY anterior a 0.80 y AsyncSSH anterior a 2.14.2; y podr\u00eda haber efectos en Bitvise SSH hasta la versi\u00f3n 9.31, libssh hasta la 0.10.5 y golang.org/x/crypto hasta el 17 de diciembre de 2023."
    }
  ],
  "id": "CVE-2023-48795",
  "lastModified": "2024-12-02T14:54:27.177",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-18T16:15:10.897",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2024/Mar/21"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/18/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/19/5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Mitigation"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/20/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/04/17/8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2023-48795"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugs.gentoo.org/920280"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1217950"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://crates.io/crates/thrussh/versions"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://filezilla-project.org/versions.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://forum.netgate.com/topic/184941/terrapin-ssh-attack"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10\u0026id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/NixOS/nixpkgs/pull/275249"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2189"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/advisories/GHSA-45x7-px36-x8w8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/apache/mina-sshd/issues/445"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/cyd01/KiTTY/issues/520"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/erlang/otp/releases/tag/OTP-26.2.1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/hierynomus/sshj/issues/916"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/janmojzis/tinyssh/issues/81"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation"
      ],
      "url": "https://github.com/libssh2/libssh2/pull/1291"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/mwiede/jsch/issues/457"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/mwiede/jsch/pull/461"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/openssh/openssh-portable/commits/master"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/paramiko/paramiko/issues/2337"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/proftpd/proftpd/issues/456"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/rapier1/hpn-ssh/releases"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/ronf/asyncssh/tags"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/ssh-mitm/ssh-mitm/issues/165"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/warp-tech/russh/releases/tag/v0.40.2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://gitlab.com/libssh/libssh-mirror/-/tags"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://help.panic.com/releasenotes/transmit5/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://matt.ucc.asn.au/dropbear/CHANGES"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=38684904"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=38685286"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=38732005"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://nova.app/releases/#v11.8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://oryx-embedded.com/download/#changelog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://roumenpetrov.info/secsh/#news20231220"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2023-48795"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/source-package/libssh2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202312-16"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202312-17"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20240105-0004/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/kb/HT214084"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://twitter.com/TrueSkrillor/status/1736774389725565005"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ubuntu.com/security/CVE-2023-48795"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://winscp.net/eng/docs/history#6.2.2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.bitvise.com/ssh-client-version-history#933"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.bitvise.com/ssh-server-version-history"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5586"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5588"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.netsarang.com/en/xshell-update-history/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.openssh.com/openbsd.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.openssh.com/txt/release-9.6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2023/12/18/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Mitigation"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2023/12/20/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.paramiko.org/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.terrapin-attack.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://www.theregister.com/2023/12/20/terrapin_attack_ssh"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.vandyke.com/products/securecrt/history.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2024/Mar/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/18/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/19/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Mitigation"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/12/20/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/04/17/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2023-48795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugs.gentoo.org/920280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1217950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://crates.io/crates/thrussh/versions"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://filezilla-project.org/versions.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://forum.netgate.com/topic/184941/terrapin-ssh-attack"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10\u0026id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/NixOS/nixpkgs/pull/275249"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/advisories/GHSA-45x7-px36-x8w8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/apache/mina-sshd/issues/445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/cyd01/KiTTY/issues/520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/erlang/otp/releases/tag/OTP-26.2.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/hierynomus/sshj/issues/916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/janmojzis/tinyssh/issues/81"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation"
      ],
      "url": "https://github.com/libssh2/libssh2/pull/1291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/mwiede/jsch/issues/457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/mwiede/jsch/pull/461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/openssh/openssh-portable/commits/master"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/paramiko/paramiko/issues/2337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/proftpd/proftpd/issues/456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/rapier1/hpn-ssh/releases"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/ronf/asyncssh/tags"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/ssh-mitm/ssh-mitm/issues/165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/warp-tech/russh/releases/tag/v0.40.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://gitlab.com/libssh/libssh-mirror/-/tags"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://help.panic.com/releasenotes/transmit5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://matt.ucc.asn.au/dropbear/CHANGES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=38684904"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=38685286"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=38732005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://nova.app/releases/#v11.8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://oryx-embedded.com/download/#changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://roumenpetrov.info/secsh/#news20231220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2023-48795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/source-package/libssh2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202312-16"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202312-17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20240105-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/kb/HT214084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://thorntech.com/cve-2023-48795-and-sftp-gateway/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://twitter.com/TrueSkrillor/status/1736774389725565005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ubuntu.com/security/CVE-2023-48795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://winscp.net/eng/docs/history#6.2.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.bitvise.com/ssh-client-version-history#933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.bitvise.com/ssh-server-version-history"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5586"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.netsarang.com/en/xshell-update-history/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.openssh.com/openbsd.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.openssh.com/txt/release-9.6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2023/12/18/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Mitigation"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2023/12/20/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.paramiko.org/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.terrapin-attack.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Press/Media Coverage"
      ],
      "url": "https://www.theregister.com/2023/12/20/terrapin_attack_ssh"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.vandyke.com/products/securecrt/history.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-354"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-01-01 05:00
Modified
2024-11-20 23:28
Severity ?
Summary
A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials.
Impacted products
Vendor Product Version
ssh ssh 1.2.27



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user\u0027s credentials."
    }
  ],
  "id": "CVE-1999-0248",
  "lastModified": "2024-11-20T23:28:14.217",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-01-01T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access.
Impacted products
Vendor Product Version
ssh ssh 1.2.0
ssh ssh 1.2.1
ssh ssh 1.2.2
ssh ssh 1.2.3
ssh ssh 1.2.4
ssh ssh 1.2.5
ssh ssh 1.2.6
ssh ssh 1.2.7
ssh ssh 1.2.8
ssh ssh 1.2.9
ssh ssh 1.2.10
ssh ssh 1.2.11
ssh ssh 1.2.12
ssh ssh 1.2.13
ssh ssh 1.2.14
ssh ssh 1.2.15
ssh ssh 1.2.16
ssh ssh 1.2.17
ssh ssh 1.2.18
ssh ssh 1.2.19
ssh ssh 1.2.20
ssh ssh 1.2.21
ssh ssh 1.2.22
ssh ssh 1.2.23
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31
ssh ssh2 2.0
ssh ssh2 2.0.1
ssh ssh2 2.0.2
ssh ssh2 2.0.3
ssh ssh2 2.0.4
ssh ssh2 2.0.5
ssh ssh2 2.0.6
ssh ssh2 2.0.7
ssh ssh2 2.0.8
ssh ssh2 2.0.9
ssh ssh2 2.0.10
ssh ssh2 2.0.11
ssh ssh2 2.0.12
ssh ssh2 2.0.13
ssh ssh2 2.1
ssh ssh2 2.2
ssh ssh2 2.3
ssh ssh2 2.4
ssh ssh2 2.5
ssh ssh2 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "507B82BD-BAC9-4869-B93E-7A1FB07A4397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A1DA84-B950-4586-8057-FB14BC54AE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85741CF-125B-4E29-812D-073C03A17FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F227B58E-6AA9-4EC6-B020-43F61728266E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "894266AB-9AE6-4CF5-9B0D-14158B124588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72378BB-259C-4D15-BB05-7270D85CC484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh2:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D22008E-6548-4F5E-95FA-56F1B96EED2F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 1 through 3, and possibly other versions, allows local users to bypass restricted shells such as rbash or rksh by uploading a script to a world-writeable directory, then executing that script to gain normal shell access."
    }
  ],
  "id": "CVE-2002-1715",
  "lastModified": "2024-11-20T23:41:56.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/archive/1/268446"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/4547"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/archive/1/268446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/4547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8908"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-08-22 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
Impacted products
Vendor Product Version
openbsd openssh 4.5
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B72CFB3-39C7-469C-AA59-69F5B8993BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands."
    }
  ],
  "id": "CVE-2001-0572",
  "lastModified": "2024-11-20T23:35:40.807",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-08-22T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000391"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/596827"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2001-033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/596827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2001-033.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-01-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache.
Impacted products
Vendor Product Version
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client\u0027s DNS cache."
    }
  ],
  "id": "CVE-2001-1474",
  "lastModified": "2024-11-20T23:37:46.827",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/786900"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/786900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6604"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-01-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
Impacted products
Vendor Product Version
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target\u0027s public key, which allows the attacker to compute the corresponding private key and use the target\u0027s Session ID with the compromised key pair to masquerade as the target."
    }
  ],
  "id": "CVE-2001-1473",
  "lastModified": "2024-11-20T23:37:46.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/684820"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/684820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6603"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-06-27 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
References
cve@mitre.orgftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc
cve@mitre.orghttp://marc.info/?l=bugtraq&m=98158450021686&w=2
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/l-047.shtml
cve@mitre.orghttp://www.debian.org/security/2001/dsa-023
cve@mitre.orghttp://www.debian.org/security/2001/dsa-027
cve@mitre.orghttp://www.debian.org/security/2001/dsa-086
cve@mitre.orghttp://www.novell.com/linux/security/advisories/adv004_ssh.html
cve@mitre.orghttp://www.osvdb.org/2116
cve@mitre.orghttp://www.securityfocus.com/bid/2344Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/6082
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=98158450021686&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/l-047.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2001/dsa-023
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2001/dsa-027
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2001/dsa-086
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/adv004_ssh.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/2116
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/2344Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/6082
Impacted products
Vendor Product Version
openbsd openssh 1.2.3
openbsd openssh 2.1
openbsd openssh 2.1.1
ssh ssh *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA997F5E-29FE-454A-9006-001D732CD4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA12144-E18D-4B08-A287-84AF8D061E2E",
              "versionEndIncluding": "1.2.31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a \"Bleichenbacher attack\" on PKCS#1 version 1.5."
    }
  ],
  "id": "CVE-2001-0361",
  "lastModified": "2024-11-20T23:35:11.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=98158450021686\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/l-047.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2001/dsa-023"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2001/dsa-027"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2001/dsa-086"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/adv004_ssh.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/2116"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2344"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=98158450021686\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/l-047.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2001/dsa-023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2001/dsa-027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2001/dsa-086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/adv004_ssh.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/2116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6082"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-07-05 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS.
Impacted products
Vendor Product Version
ssh ssh 1.2.27



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS."
    }
  ],
  "id": "CVE-2000-0575",
  "lastModified": "2024-11-20T23:32:48.797",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-07-05T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=96256265914116\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1426"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=96256265914116\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4903"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-01-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message's cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.
Impacted products
Vendor Product Version
ssh ssh 1.2.24
ssh ssh 1.2.25
ssh ssh 1.2.26
ssh ssh 1.2.27
ssh ssh 1.2.28
ssh ssh 1.2.29
ssh ssh 1.2.30
ssh ssh 1.2.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message\u0027s cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified."
    }
  ],
  "id": "CVE-2001-1469",
  "lastModified": "2024-11-20T23:37:46.123",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/25309"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/25309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-200103-0055
Vulnerability from variot

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. Secure Shell, or SSH, is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. This would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). As a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. UPDATE: There have been reports suggesting that exploitation of this vulnerability may be widespread. Since early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. NOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. Secure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. ** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. Cisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. As many of these devices are critical infrastructure components, more serious network outages may occur. Cisco has released upgrades that will eliminate this vulnerability. An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user. As a result, the user could transmit data, meant to be encrypted, as plaintext. The problem lies in deattack.c, a program developed by CORE SDI to prevent the SSH1 protocol from being attacked by CRC32 compensation. Because a 16-bit unsigned variable is mistakenly used as a 32-bit variable in the detect_attack() function, the table index overflow problem is caused. The problem is in the detect_attack() function: ... / detect_attack Detects a crc32 compensation attack on a packet / int detect_attack(unsigned char buf, word32 len, unsigned char IV) { static word16 h = (word16 * ) NULL; () static word16 n = HASH_MINSIZE / HASH_ENTRYSIZE; register word32 i , j; After allocation by xmalloc(0), the following code will be executed: for (i = HASH(c) & (n - 1); h[i] != HASH_UNUSED; Since i is set as a 32-bit unsigned integer, when n=0 , the result becomes: i = HASH(c) & 0xffffffff and c can be provided by the client. If the value of i exceeds the normal range, the program will segfault when trying to access h[i]. Through careful By constructing an attack packet, the attacker may overwrite the content of any address and execute arbitrary code remotely. The attacker does not need a valid system account to carry out the attack. TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to majordomo@iss.net Contact alert-owner@iss.net for help with any problems!


-----BEGIN PGP SIGNED MESSAGE-----

ISS X-Force has received reports that some individuals were unable to verify the PGP signature on the Security Alert Summary distributed earlier in the week. Due to this issue, X-Force is re-distributing the Security Alert Summary. We apologize for any inconvience this may have caused.

Internet Security Systems Security Alert Summary March 5, 2001 Volume 6 Number 4

X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php

This summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php


Contents

90 Reported Vulnerabilities

Risk Factor Key


Date Reported: 2/27/01 Vulnerability: a1-server-dos Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server denial of service X-Force URL: http://xforce.iss.net/static/6161.php


Date Reported: 2/27/01 Vulnerability: a1-server-directory-traversal Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server directory traversal X-Force URL: http://xforce.iss.net/static/6162.php


Date Reported: 2/27/01 Vulnerability: webreflex-web-server-dos Platforms Affected: WebReflex Risk Factor: Medium Attack Type: Network Based Brief Description: WebReflex Web server denial of service X-Force URL: http://xforce.iss.net/static/6163.php


Date Reported: 2/26/01 Vulnerability: sudo-bo-elevate-privileges Platforms Affected: Sudo Risk Factor: Medium Attack Type: Host Based Brief Description: Sudo buffer overflow could allow elevated user privileges X-Force URL: http://xforce.iss.net/static/6153.php


Date Reported: 2/26/01 Vulnerability: mygetright-skin-overwrite-file Platforms Affected: My GetRight Risk Factor: High Attack Type: Network Based Brief Description: My GetRight 'skin' allows remote attacker to overwrite existing files X-Force URL: http://xforce.iss.net/static/6155.php


Date Reported: 2/26/01 Vulnerability: mygetright-directory-traversal Platforms Affected: My GetRight Risk Factor: Medium Attack Type: Network Based Brief Description: My GetRight directory traversal X-Force URL: http://xforce.iss.net/static/6156.php


Date Reported: 2/26/01 Vulnerability: win2k-event-viewer-bo Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Host Based Brief Description: Windows 2000 event viewer buffer overflow X-Force URL: http://xforce.iss.net/static/6160.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-cpu-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra CPU denial of service X-Force URL: http://xforce.iss.net/static/6159.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-kernel-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra Server kernel denial of service X-Force URL: http://xforce.iss.net/static/6158.php


Date Reported: 2/23/01 Vulnerability: mercur-expn-bo Platforms Affected: MERCUR Risk Factor: High Attack Type: Network Based Brief Description: MERCUR Mailserver EXPN buffer overflow X-Force URL: http://xforce.iss.net/static/6149.php


Date Reported: 2/23/01 Vulnerability: sedum-http-dos Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP server denial of service X-Force URL: http://xforce.iss.net/static/6152.php


Date Reported: 2/23/01 Vulnerability: tru64-inetd-dos Platforms Affected: Tru64 Risk Factor: Medium Attack Type: Host Based Brief Description: Tru64 UNIX inetd denial of service X-Force URL: http://xforce.iss.net/static/6157.php


Date Reported: 2/22/01 Vulnerability: outlook-vcard-bo Platforms Affected: Microsoft Outlook Risk Factor: High Attack Type: Host Based Brief Description: Outlook and Outlook Express vCards buffer overflow X-Force URL: http://xforce.iss.net/static/6145.php


Date Reported: 2/22/01 Vulnerability: ultimatebb-cookie-member-number Platforms Affected: Ultimate Bulletin Board Risk Factor: High Attack Type: Network Based Brief Description: Ultimate Bulletin Board cookie allows attacker to change member number X-Force URL: http://xforce.iss.net/static/6144.php


Date Reported: 2/21/01 Vulnerability: ultimatebb-cookie-gain-privileges Platforms Affected: Ultimate Bulletin Board Risk Factor: Medium Attack Type: Network Based Brief Description: Ultimate Bulletin Board allows remote attacker to obtain cookie information X-Force URL: http://xforce.iss.net/static/6142.php


Date Reported: 2/21/01 Vulnerability: sendmail-elevate-privileges Platforms Affected: Sendmail Risk Factor: High Attack Type: Host Based Brief Description: Sendmail -bt command could allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6147.php


Date Reported: 2/21/01 Vulnerability: jre-jdk-execute-commands Platforms Affected: JRE/JDK Risk Factor: High Attack Type: Host Based Brief Description: JRE/JDK could allow unauthorized execution of commands X-Force URL: http://xforce.iss.net/static/6143.php


Date Reported: 2/20/01 Vulnerability: licq-remote-port-dos Platforms Affected: LICQ Risk Factor: Medium Attack Type: Network Based Brief Description: LICQ remote denial of service X-Force URL: http://xforce.iss.net/static/6134.php


Date Reported: 2/20/01 Vulnerability: pgp4pine-expired-keys Platforms Affected: pgp4pine Risk Factor: Medium Attack Type: Host Based Brief Description: pgp4pine may transmit messages using expired public keys X-Force URL: http://xforce.iss.net/static/6135.php


Date Reported: 2/20/01 Vulnerability: chilisoft-asp-view-files Platforms Affected: Chili!Soft ASP Risk Factor: High Attack Type: Network Based Brief Description: Chili!Soft ASP allows remote attackers to gain access to sensitive information X-Force URL: http://xforce.iss.net/static/6137.php


Date Reported: 2/20/01 Vulnerability: win2k-domain-controller-dos Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Network/Host Based Brief Description: Windows 2000 domain controller denial of service X-Force URL: http://xforce.iss.net/static/6136.php


Date Reported: 2/19/01 Vulnerability: asx-remote-dos Platforms Affected: ASX Switches Risk Factor: Medium Attack Type: Network Based Brief Description: ASX switches allow remote denial of service X-Force URL: http://xforce.iss.net/static/6133.php


Date Reported: 2/18/01 Vulnerability: http-cgi-mailnews-username Platforms Affected: Mailnews.cgi Risk Factor: High Attack Type: Network Based Brief Description: Mailnews.cgi allows remote attacker to execute shell commands using username X-Force URL: http://xforce.iss.net/static/6139.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-reveal-path Platforms Affected: BadBlue Risk Factor: Low Attack Type: Network Based Brief Description: BadBlue ext.dll library reveals path X-Force URL: http://xforce.iss.net/static/6130.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-dos Platforms Affected: BadBlue Risk Factor: Medium Attack Type: Network Based Brief Description: BadBlue ext.dll library denial of service X-Force URL: http://xforce.iss.net/static/6131.php


Date Reported: 2/17/01 Vulnerability: moby-netsuite-bo Platforms Affected: Moby's NetSuite Risk Factor: Medium Attack Type: Network Based Brief Description: Moby's NetSuite Web server buffer overflow X-Force URL: http://xforce.iss.net/static/6132.php


Date Reported: 2/16/01 Vulnerability: webactive-directory-traversal Platforms Affected: WEBactive Risk Factor: Medium Attack Type: Network/Host Based Brief Description: WEBactive HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6121.php


Date Reported: 2/16/01 Vulnerability: esone-cgi-directory-traversal Platforms Affected: ES.One store.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Thinking Arts ES.One store.cgi directory traversal X-Force URL: http://xforce.iss.net/static/6124.php


Date Reported: 2/16/01 Vulnerability: vshell-username-bo Platforms Affected: VShell Risk Factor: High Attack Type: Network Based Brief Description: VShell username buffer overflow X-Force URL: http://xforce.iss.net/static/6146.php


Date Reported: 2/16/01 Vulnerability: vshell-port-forwarding-rule Platforms Affected: VShell Risk Factor: Medium Attack Type: Network/Host Based Brief Description: VShell uses weak port forwarding rule X-Force URL: http://xforce.iss.net/static/6148.php


Date Reported: 2/15/01 Vulnerability: pi3web-isapi-bo Platforms Affected: Pi3Web Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Pi3Web ISAPI tstisapi.dll denial of service X-Force URL: http://xforce.iss.net/static/6113.php


Date Reported: 2/15/01 Vulnerability: pi3web-reveal-path Platforms Affected: Pi3Web Risk Factor: Low Attack Type: Network Based Brief Description: Pi3Web reveals physical path of server X-Force URL: http://xforce.iss.net/static/6114.php


Date Reported: 2/15/01 Vulnerability: bajie-execute-shell Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer execute shell commands X-Force URL: http://xforce.iss.net/static/6117.php


Date Reported: 2/15/01 Vulnerability: bajie-directory-traversal Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer directory traversal X-Force URL: http://xforce.iss.net/static/6115.php


Date Reported: 2/15/01 Vulnerability: resin-directory-traversal Platforms Affected: Resin Risk Factor: Medium Attack Type: Network Based Brief Description: Resin Web server directory traversal X-Force URL: http://xforce.iss.net/static/6118.php


Date Reported: 2/15/01 Vulnerability: netware-mitm-recover-passwords Platforms Affected: Netware Risk Factor: Low Attack Type: Network Based Brief Description: Netware "man in the middle" attack password recovery X-Force URL: http://xforce.iss.net/static/6116.php


Date Reported: 2/14/01 Vulnerability: firebox-pptp-dos Platforms Affected: WatchGuard Firebox II Risk Factor: High Attack Type: Network Based Brief Description: WatchGuard Firebox II PPTP denial of service X-Force URL: http://xforce.iss.net/static/6109.php


Date Reported: 2/14/01 Vulnerability: hp-virtualvault-iws-dos Platforms Affected: HP VirtualVault Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HP VirtualVault iPlanet Web Server denial of service X-Force URL: http://xforce.iss.net/static/6110.php


Date Reported: 2/14/01 Vulnerability: kicq-execute-commands Platforms Affected: KICQ Risk Factor: High Attack Type: Network Based Brief Description: kicq could allow remote execution of commands X-Force URL: http://xforce.iss.net/static/6112.php


Date Reported: 2/14/01 Vulnerability: hp-text-editor-bo Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP Text editors buffer overflow X-Force URL: http://xforce.iss.net/static/6111.php


Date Reported: 2/13/01 Vulnerability: sendtemp-pl-read-files Platforms Affected: sendtemp.pl Risk Factor: Medium Attack Type: Network/Host Based Brief Description: sendtemp.pl could allow an attacker to read files on the server X-Force URL: http://xforce.iss.net/static/6104.php


Date Reported: 2/13/01 Vulnerability: analog-alias-bo Platforms Affected: Analog ALIAS Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Analog ALIAS command buffer overflow X-Force URL: http://xforce.iss.net/static/6105.php


Date Reported: 2/13/01 Vulnerability: elm-long-string-bo Platforms Affected: Elm Risk Factor: Medium Attack Type: Host Based Brief Description: ELM -f command long string buffer overflow X-Force URL: http://xforce.iss.net/static/6151.php


Date Reported: 2/13/01 Vulnerability: winnt-pptp-dos Platforms Affected: Windows NT Risk Factor: Medium Attack Type: Network Based Brief Description: Windows NT PPTP denial of service X-Force URL: http://xforce.iss.net/static/6103.php


Date Reported: 2/12/01 Vulnerability: startinnfeed-format-string Platforms Affected: Inn Risk Factor: High Attack Type: Host Based Brief Description: Inn 'startinnfeed' binary format string attack X-Force URL: http://xforce.iss.net/static/6099.php


Date Reported: 2/12/01 Vulnerability: his-auktion-cgi-url Platforms Affected: HIS Auktion Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HIS Auktion CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6090.php


Date Reported: 2/12/01 Vulnerability: wayboard-cgi-view-files Platforms Affected: Way-BOARD Risk Factor: Medium Attack Type: Network Based Brief Description: Way-BOARD CGI could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6091.php


Date Reported: 2/12/01 Vulnerability: muskat-empower-url-dir Platforms Affected: Musket Empower Risk Factor: Low Attack Type: Network/Host Based Brief Description: Musket Empower could allow attackers to gain access to the DB directory path X-Force URL: http://xforce.iss.net/static/6093.php


Date Reported: 2/12/01 Vulnerability: icq-icu-rtf-dos Platforms Affected: LICQ Gnome ICU Risk Factor: Low Attack Type: Network/Host Based Brief Description: LICQ and Gnome ICU rtf file denial of service X-Force URL: http://xforce.iss.net/static/6096.php


Date Reported: 2/12/01 Vulnerability: commerce-cgi-view-files Platforms Affected: Commerce.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Commerce.cgi could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6095.php


Date Reported: 2/12/01 Vulnerability: roads-search-view-files Platforms Affected: ROADS Risk Factor: Medium Attack Type: Network Based Brief Description: ROADS could allow attackers to view unauthorized files using search.pl program X-Force URL: http://xforce.iss.net/static/6097.php


Date Reported: 2/12/01 Vulnerability: webpage-cgi-view-info Platforms Affected: WebPage.cgi Risk Factor: Low Attack Type: Network Based Brief Description: WebPage.cgi allows attackers to view sensitive information X-Force URL: http://xforce.iss.net/static/6100.php


Date Reported: 2/12/01 Vulnerability: webspirs-cgi-view-files Platforms Affected: WebSPIRS Risk Factor: Medium Attack Type: Network Based Brief Description: WebSPIRS CGI could allow an attacker to view unauthorized files X-Force URL: http://xforce.iss.net/static/6101.php


Date Reported: 2/12/01 Vulnerability: webpals-library-cgi-url Platforms Affected: WebPALS Risk Factor: Medium Attack Type: Network Based Brief Description: WebPALS Library System CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6102.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-permissions Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled with nolicense permissions X-Force URL: http://xforce.iss.net/static/6092.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-symlink Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled allows symlink in nolicense X-Force URL: http://xforce.iss.net/static/6094.php


Date Reported: 2/10/01 Vulnerability: vixie-crontab-bo Platforms Affected: Vixie crontab Risk Factor: Medium Attack Type: Host Based Brief Description: Vixie crontab buffer overflow X-Force URL: http://xforce.iss.net/static/6098.php


Date Reported: 2/10/01 Vulnerability: novell-groupwise-bypass-policies Platforms Affected: Novell GroupWise Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Novell Groupwise allows user to bypass policies and view files X-Force URL: http://xforce.iss.net/static/6089.php


Date Reported: 2/9/01 Vulnerability: infobot-calc-gain-access Platforms Affected: Infobot Risk Factor: High Attack Type: Network Based Brief Description: Infobot 'calc' command allows remote users to gain access X-Force URL: http://xforce.iss.net/static/6078.php


Date Reported: 2/8/01 Vulnerability: linux-sysctl-read-memory Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux kernel sysctl() read memory X-Force URL: http://xforce.iss.net/static/6079.php


Date Reported: 2/8/01 Vulnerability: openssh-bypass-authentication Platforms Affected: OpenSSH Risk Factor: High Attack Type: Network/Host Based Brief Description: OpenSSH 2.3.1 allows remote users to bypass authentication X-Force URL: http://xforce.iss.net/static/6084.php


Date Reported: 2/8/01 Vulnerability: lotus-notes-stored-forms Platforms Affected: Lotus Notes Risk Factor: High Attack Type: Network/Host Based Brief Description: Lotus Notes stored forms X-Force URL: http://xforce.iss.net/static/6087.php


Date Reported: 2/8/01 Vulnerability: linux-ptrace-modify-process Platforms Affected: Linux Risk Factor: High Attack Type: Host Based Brief Description: Linux kernel ptrace modify process X-Force URL: http://xforce.iss.net/static/6080.php


Date Reported: 2/8/01 Vulnerability: ssh-deattack-overwrite-memory Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 deattack.c allows memory to be overwritten X-Force URL: http://xforce.iss.net/static/6083.php


Date Reported: 2/7/01 Vulnerability: dc20ctrl-port-bo Platforms Affected: FreeBSD Risk Factor: Medium Attack Type: Host Based Brief Description: FreeBSD dc20ctrl port buffer overflow X-Force URL: http://xforce.iss.net/static/6077.php


Date Reported: 2/7/01 Vulnerability: ja-xklock-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: ja-xklock buffer overflow X-Force URL: http://xforce.iss.net/static/6073.php


Date Reported: 2/7/01 Vulnerability: ja-elvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ja-elvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6074.php


Date Reported: 2/7/01 Vulnerability: ko-helvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ko-helvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6075.php


Date Reported: 2/7/01 Vulnerability: serverworx-directory-traversal Platforms Affected: ServerWorx Risk Factor: Medium Attack Type: Network Based Brief Description: ServerWorx directory traversal X-Force URL: http://xforce.iss.net/static/6081.php


Date Reported: 2/7/01 Vulnerability: ntlm-ssp-elevate-privileges Platforms Affected: NTLM Risk Factor: High Attack Type: Host Based Brief Description: NTLM Security Support Provider could allow elevation of privileges X-Force URL: http://xforce.iss.net/static/6076.php


Date Reported: 2/7/01 Vulnerability: ssh-session-key-recovery Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 session key recovery X-Force URL: http://xforce.iss.net/static/6082.php


Date Reported: 2/6/01 Vulnerability: aolserver-directory-traversal Platforms Affected: AOLserver Risk Factor: Medium Attack Type: Network Based Brief Description: AOLserver directory traversal X-Force URL: http://xforce.iss.net/static/6069.php


Date Reported: 2/6/01 Vulnerability: chilisoft-asp-elevate-privileges Platforms Affected: Chili!Soft Risk Factor: High Attack Type: Network/Host Based Brief Description: Chili!Soft ASP could allow elevated privileges X-Force URL: http://xforce.iss.net/static/6072.php


Date Reported: 2/6/01 Vulnerability: win-udp-dos Platforms Affected: Windows Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Windows UDP socket denial of service X-Force URL: http://xforce.iss.net/static/6070.php


Date Reported: 2/5/01 Vulnerability: ssh-daemon-failed-login Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH daemon failed login attempts are not logged X-Force URL: http://xforce.iss.net/static/6071.php


Date Reported: 2/5/01 Vulnerability: picserver-directory-traversal Platforms Affected: PicServer Risk Factor: Medium Attack Type: Network Based Brief Description: PicServer directory traversal X-Force URL: http://xforce.iss.net/static/6065.php


Date Reported: 2/5/01 Vulnerability: biblioweb-directory-traversal Platforms Affected: BiblioWeb Risk Factor: Medium Attack Type: Network Based Brief Description: BiblioWeb Server directory traversal X-Force URL: http://xforce.iss.net/static/6066.php


Date Reported: 2/5/01 Vulnerability: biblioweb-get-dos Platforms Affected: BiblioWeb Risk Factor: Low Attack Type: Network Based Brief Description: BiblioWeb Server GET request denial of service X-Force URL: http://xforce.iss.net/static/6068.php


Date Reported: 2/5/01 Vulnerability: ibm-netcommerce-reveal-information Platforms Affected: IBM Risk Factor: Medium Attack Type: Network/Host Based Brief Description: IBM Net.Commerce could reveal sensitive information X-Force URL: http://xforce.iss.net/static/6067.php


Date Reported: 2/5/01 Vulnerability: win-dde-elevate-privileges Platforms Affected: Windows DDE Risk Factor: High Attack Type: Host Based Brief Description: Windows DDE can allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6062.php


Date Reported: 2/4/01 Vulnerability: hsweb-directory-browsing Platforms Affected: HSWeb Risk Factor: Low Attack Type: Network Based Brief Description: HSWeb Web Server allows attacker to browse directories X-Force URL: http://xforce.iss.net/static/6061.php


Date Reported: 2/4/01 Vulnerability: sedum-directory-traversal Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6063.php


Date Reported: 2/4/01 Vulnerability: free-java-directory-traversal Platforms Affected: Free Java Risk Factor: Medium Attack Type: Network Based Brief Description: Free Java Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6064.php


Date Reported: 2/2/01 Vulnerability: goahead-directory-traversal Platforms Affected: GoAhead Risk Factor: High Attack Type: Network Based Brief Description: GoAhead Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6046.php


Date Reported: 2/2/01 Vulnerability: gnuserv-tcp-cookie-overflow Platforms Affected: Gnuserv Risk Factor: High Attack Type: Network/Host Based Brief Description: Gnuserv TCP enabled cookie buffer overflow X-Force URL: http://xforce.iss.net/static/6056.php


Date Reported: 2/2/01 Vulnerability: xmail-ctrlserver-bo Platforms Affected: Xmail CTRLServer Risk Factor: High Attack Type: Network Based Brief Description: XMail CTRLServer buffer overflow X-Force URL: http://xforce.iss.net/static/6060.php


Date Reported: 2/2/01 Vulnerability: netscape-webpublisher-acl-permissions Platforms Affected: Netscape Web Publisher Risk Factor: Medium Attack Type: Network Based Brief Description: Netcape Web Publisher poor ACL permissions X-Force URL: http://xforce.iss.net/static/6058.php


Date Reported: 2/1/01 Vulnerability: cups-httpgets-dos Platforms Affected: CUPS Risk Factor: High Attack Type: Host Based Brief Description: CUPS httpGets() function denial of service X-Force URL: http://xforce.iss.net/static/6043.php


Date Reported: 2/1/01 Vulnerability: prospero-get-pin Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero GET request reveals PIN information X-Force URL: http://xforce.iss.net/static/6044.php


Date Reported: 2/1/01 Vulnerability: prospero-weak-permissions Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero uses weak permissions X-Force URL: http://xforce.iss.net/static/6045.php


Risk Factor Key:

    High    Any vulnerability that provides an attacker with immediate
            access into a machine, gains superuser access, or bypasses
            a firewall.  Example:  A vulnerable Sendmail 8.6.5 version
            that allows an intruder to execute commands on mail
            server. 
    Medium  Any vulnerability that provides information that has a
            high potential of giving system access to an intruder. 
            Example: A misconfigured TFTP or vulnerable NIS server
            that allows an intruder to get the password file that
            could contain an account with a guessable password. 
    Low     Any vulnerability that provides information that
            potentially could lead to a compromise.  Example:  A
            finger that allows an intruder to find out who is online
            and potential accounts to attempt to crack passwords
            via brute force methods.

ISS is a leading global provider of security management solutions for e-business. By offering best-of-breed SAFEsuite(tm) security software, comprehensive ePatrol(tm) monitoring services and industry-leading expertise, ISS serves as its customers' trusted security provider protecting digital assets and ensuring the availability, confidentiality and integrity of computer systems and information critical to e-business success. ISS' security management solutions protect more than 5,000 customers including 21 of the 25 largest U.S. commercial banks, 9 of the 10 largest telecommunications companies and over 35 government agencies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe and Latin America. For more information, visit the ISS Web site at www.iss.net or call 800-776-2362.

Copyright (c) 2001 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv

iQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV 1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA h0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B tT+ylKw4hn4= =kfHg -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200103-0055",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 3.2,
        "vendor": "ssh security",
        "version": null
      },
      {
        "model": "catalyst csx",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "60005.3"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.24"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.25"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.26"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.27"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.28"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.29"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.30"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "openssh",
        "version": null
      },
      {
        "model": "ios 12.1 ex",
        "scope": null,
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "openbsd",
        "version": "1.2.2"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "openbsd",
        "version": "1.2.3"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "openbsd",
        "version": "2.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "openbsd",
        "version": "2.1.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "openbsd",
        "version": "2.2"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60006.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60005.5"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "core sdi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "smoothwall",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "holger lamm",
        "version": null
      },
      {
        "model": "ios 12.2xq",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xh",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xe",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xd",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xa",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2t",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "ios 12.1yf",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yd",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yc",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yb",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xu",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xt",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xq",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xp",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xm",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xl",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xj",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xi",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xh",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xg",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xf",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xc",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xb",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1t",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ec",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1e",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0s",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "60006.2(0.110)"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.30"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.29"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.28"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.27"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.26"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.25"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.24"
      },
      {
        "model": "computing safeword agent for ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "secure",
        "version": "1.0"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.2"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.1.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "1.2.3"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "1.2.2"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(1)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(5)"
      },
      {
        "model": "ios 12.1ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1xv"
      },
      {
        "model": "ios 12.1xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ez",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ey",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ex",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.10s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.4"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.3"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.2"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.1"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.0"
      },
      {
        "model": "openssh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.3"
      },
      {
        "model": "webns b11s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "webns 1b6s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "webns 0b22s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "webns 1b42s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0(1)"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(2)"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(6)"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2(3)"
      },
      {
        "model": "ios 12.2 t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2(1.1)"
      },
      {
        "model": "ios 12.2 xq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xd1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ec3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ez1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yd2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yb4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xy6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv3"
      },
      {
        "model": "ios 12.1 xu1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xr2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xg5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xm4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xp4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst pan",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3"
      },
      {
        "model": "catalyst",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.2(0.111)"
      },
      {
        "model": "catalyst",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(2.13)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios 12.2yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ye",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0xv"
      },
      {
        "model": "ios 12.0xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0st",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "css11000 content services switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60007.1(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60007.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3(4)"
      },
      {
        "model": "catalyst pan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.2(0.111)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(2.13)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(4)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(3)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(13)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(4)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(3)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4"
      },
      {
        "model": "lamm pgp4pine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "holger",
        "version": "1.75.6"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@echelon.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2001-0144",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-2966",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2001-0144",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2001-0144",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#290140",
            "trust": 0.8,
            "value": "21.09"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#13877",
            "trust": 0.8,
            "value": "6.84"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#25309",
            "trust": 0.8,
            "value": "0.39"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#945216",
            "trust": 0.8,
            "value": "99.00"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#566640",
            "trust": 0.8,
            "value": "0.68"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#651994",
            "trust": 0.8,
            "value": "1.50"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#315308",
            "trust": 0.8,
            "value": "2.06"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200103-069",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-2966",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2001-0144",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. Secure Shell, or SSH, is an encrypted remote access protocol.  SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. \nThis would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer.  The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). \nAs a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker.  This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. \n**UPDATE**:\nThere have been reports suggesting that exploitation of this vulnerability may be widespread. \nSince early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet.  Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. \nNOTE: Cisco 11000 Content Service Switch family is  vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. \nSecure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. \n** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. \nCisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption.  The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets.  As many of these devices are critical infrastructure components, more serious network outages may occur. \nCisco has released upgrades that will eliminate this vulnerability.  An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user.  As a result, the user could transmit data, meant to be encrypted, as plaintext. The problem lies in deattack.c, a program developed by CORE SDI to prevent the SSH1 protocol from being attacked by CRC32 compensation. Because a 16-bit unsigned variable is mistakenly used as a 32-bit variable in the detect_attack() function, the table index overflow problem is caused. The problem is in the detect_attack() function: ... /* detect_attack Detects a crc32 compensation attack on a packet */ int detect_attack(unsigned char *buf, word32 len, unsigned char *IV) { static word16 *h = (word16 * ) NULL; (*) static word16 n = HASH_MINSIZE / HASH_ENTRYSIZE; register word32 i , j; After allocation by xmalloc(0), the following code will be executed: for (i = HASH(c) \u0026 (n - 1); h[i] != HASH_UNUSED; Since i is set as a 32-bit unsigned integer, when n=0 , the result becomes: i = HASH(c) \u0026 0xffffffff and c can be provided by the client. If the value of i exceeds the normal range, the program will segfault when trying to access h[i]. Through careful By constructing an attack packet, the attacker may overwrite the content of any address and execute arbitrary code remotely. The attacker does not need a valid system account to carry out the attack. \nTO UNSUBSCRIBE: email \"unsubscribe alert\" in the body of your message to\nmajordomo@iss.net  Contact alert-owner@iss.net for help with any problems!\n---------------------------------------------------------------------------\n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nISS X-Force has received reports that some individuals were unable to \nverify the PGP signature on the Security Alert Summary distributed earlier \nin the week. Due to this issue, X-Force is re-distributing the Security \nAlert Summary. We apologize for any inconvience this may have caused. \n\nInternet Security Systems Security Alert Summary\nMarch 5, 2001\nVolume 6 Number 4\n\nX-Force Vulnerability and Threat Database: http://xforce.iss.net/ To\nreceive these Alert Summaries as well as other Alerts and Advisories,\nsubscribe to the Internet Security Systems Alert mailing list at:\nhttp://xforce.iss.net/maillists/index.php\n\nThis summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php\n_____\n\nContents\n\n90 Reported Vulnerabilities\n\nRisk Factor Key\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-dos\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6161.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-directory-traversal\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6162.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          webreflex-web-server-dos\nPlatforms Affected:     WebReflex\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebReflex Web server denial of service\nX-Force URL:            http://xforce.iss.net/static/6163.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          sudo-bo-elevate-privileges\nPlatforms Affected:     Sudo\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Sudo buffer overflow could allow elevated user privileges\nX-Force URL:            http://xforce.iss.net/static/6153.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-skin-overwrite-file\nPlatforms Affected:     My GetRight\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      My GetRight \u0027skin\u0027 allows remote attacker to overwrite existing files\nX-Force URL:            http://xforce.iss.net/static/6155.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-directory-traversal\nPlatforms Affected:     My GetRight\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      My GetRight directory traversal\nX-Force URL:            http://xforce.iss.net/static/6156.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          win2k-event-viewer-bo\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Host Based\nBrief Description:      Windows 2000 event viewer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6160.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-cpu-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra CPU denial of service\nX-Force URL:            http://xforce.iss.net/static/6159.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-kernel-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra Server kernel denial of service\nX-Force URL:            http://xforce.iss.net/static/6158.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          mercur-expn-bo\nPlatforms Affected:     MERCUR\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      MERCUR Mailserver EXPN buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6149.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          sedum-http-dos\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP server denial of service\nX-Force URL:            http://xforce.iss.net/static/6152.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          tru64-inetd-dos\nPlatforms Affected:     Tru64\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Tru64 UNIX inetd denial of service\nX-Force URL:            http://xforce.iss.net/static/6157.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          outlook-vcard-bo\nPlatforms Affected:     Microsoft Outlook\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Outlook and Outlook Express vCards buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6145.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          ultimatebb-cookie-member-number\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board cookie allows attacker to change member number\nX-Force URL:            http://xforce.iss.net/static/6144.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          ultimatebb-cookie-gain-privileges\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board allows remote attacker to obtain cookie information\nX-Force URL:            http://xforce.iss.net/static/6142.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          sendmail-elevate-privileges\nPlatforms Affected:     Sendmail\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Sendmail -bt command could allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6147.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          jre-jdk-execute-commands\nPlatforms Affected:     JRE/JDK\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      JRE/JDK could allow unauthorized execution of commands\nX-Force URL:            http://xforce.iss.net/static/6143.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          licq-remote-port-dos\nPlatforms Affected:     LICQ\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      LICQ remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6134.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          pgp4pine-expired-keys\nPlatforms Affected:     pgp4pine\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      pgp4pine may transmit messages using expired public keys\nX-Force URL:            http://xforce.iss.net/static/6135.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          chilisoft-asp-view-files\nPlatforms Affected:     Chili!Soft ASP\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Chili!Soft ASP allows remote attackers to gain access to sensitive information\nX-Force URL:            http://xforce.iss.net/static/6137.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          win2k-domain-controller-dos\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Network/Host Based\nBrief Description:      Windows 2000 domain controller denial of service\nX-Force URL:            http://xforce.iss.net/static/6136.php\n\n_____\n\nDate Reported:          2/19/01\nVulnerability:          asx-remote-dos\nPlatforms Affected:     ASX Switches\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ASX switches allow remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6133.php\n\n_____\n\nDate Reported:          2/18/01\nVulnerability:          http-cgi-mailnews-username\nPlatforms Affected:     Mailnews.cgi\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Mailnews.cgi allows remote attacker to execute shell commands using username\nX-Force URL:            http://xforce.iss.net/static/6139.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-reveal-path\nPlatforms Affected:     BadBlue\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library reveals path\nX-Force URL:            http://xforce.iss.net/static/6130.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-dos\nPlatforms Affected:     BadBlue\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library denial of service\nX-Force URL:            http://xforce.iss.net/static/6131.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          moby-netsuite-bo\nPlatforms Affected:     Moby\u0027s NetSuite\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Moby\u0027s NetSuite Web server buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6132.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          webactive-directory-traversal\nPlatforms Affected:     WEBactive\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      WEBactive HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6121.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          esone-cgi-directory-traversal\nPlatforms Affected:     ES.One store.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Thinking Arts ES.One store.cgi directory traversal\nX-Force URL:            http://xforce.iss.net/static/6124.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-username-bo\nPlatforms Affected:     VShell\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      VShell username buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6146.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-port-forwarding-rule\nPlatforms Affected:     VShell\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      VShell uses weak port forwarding rule\nX-Force URL:            http://xforce.iss.net/static/6148.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-isapi-bo\nPlatforms Affected:     Pi3Web\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Pi3Web ISAPI tstisapi.dll denial of service\nX-Force URL:            http://xforce.iss.net/static/6113.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-reveal-path\nPlatforms Affected:     Pi3Web\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Pi3Web reveals physical path of server\nX-Force URL:            http://xforce.iss.net/static/6114.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-execute-shell\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer execute shell commands\nX-Force URL:            http://xforce.iss.net/static/6117.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-directory-traversal\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6115.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          resin-directory-traversal\nPlatforms Affected:     Resin\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Resin Web server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6118.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          netware-mitm-recover-passwords\nPlatforms Affected:     Netware\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Netware \"man in the middle\" attack password recovery\nX-Force URL:            http://xforce.iss.net/static/6116.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          firebox-pptp-dos\nPlatforms Affected:     WatchGuard Firebox II\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      WatchGuard Firebox II PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6109.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-virtualvault-iws-dos\nPlatforms Affected:     HP VirtualVault\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HP VirtualVault iPlanet Web Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6110.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          kicq-execute-commands\nPlatforms Affected:     KICQ\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      kicq could allow remote execution of commands\nX-Force URL:            http://xforce.iss.net/static/6112.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-text-editor-bo\nPlatforms Affected:     HPUX\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      HP Text editors buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6111.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          sendtemp-pl-read-files\nPlatforms Affected:     sendtemp.pl\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      sendtemp.pl could allow an attacker to read files on the server\nX-Force URL:            http://xforce.iss.net/static/6104.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          analog-alias-bo\nPlatforms Affected:     Analog ALIAS\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Analog ALIAS command buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6105.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          elm-long-string-bo\nPlatforms Affected:     Elm\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      ELM -f command long string buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6151.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          winnt-pptp-dos\nPlatforms Affected:     Windows NT\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Windows NT PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6103.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          startinnfeed-format-string\nPlatforms Affected:     Inn\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Inn \u0027startinnfeed\u0027 binary format string attack\nX-Force URL:            http://xforce.iss.net/static/6099.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          his-auktion-cgi-url\nPlatforms Affected:     HIS Auktion\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HIS Auktion CGI script could allow attackers to view unauthorized \n                        files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6090.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          wayboard-cgi-view-files\nPlatforms Affected:     Way-BOARD\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Way-BOARD CGI could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6091.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          muskat-empower-url-dir\nPlatforms Affected:     Musket Empower\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      Musket Empower could allow attackers to gain access to the DB directory path\nX-Force URL:            http://xforce.iss.net/static/6093.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          icq-icu-rtf-dos\nPlatforms Affected:     LICQ\n                        Gnome ICU\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      LICQ and Gnome ICU rtf file denial of service\nX-Force URL:            http://xforce.iss.net/static/6096.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          commerce-cgi-view-files\nPlatforms Affected:     Commerce.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Commerce.cgi could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6095.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          roads-search-view-files\nPlatforms Affected:     ROADS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ROADS could allow attackers to view unauthorized files using search.pl program\nX-Force URL:            http://xforce.iss.net/static/6097.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpage-cgi-view-info\nPlatforms Affected:     WebPage.cgi\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      WebPage.cgi allows attackers to view sensitive information\nX-Force URL:            http://xforce.iss.net/static/6100.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webspirs-cgi-view-files\nPlatforms Affected:     WebSPIRS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebSPIRS CGI could allow an attacker to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6101.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpals-library-cgi-url\nPlatforms Affected:     WebPALS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebPALS Library System CGI script could allow attackers to view \n                        unauthorized files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6102.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-permissions\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled with nolicense permissions\nX-Force URL:            http://xforce.iss.net/static/6092.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-symlink\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled allows symlink in nolicense\nX-Force URL:            http://xforce.iss.net/static/6094.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          vixie-crontab-bo\nPlatforms Affected:     Vixie crontab\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Vixie crontab buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6098.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          novell-groupwise-bypass-policies\nPlatforms Affected:     Novell GroupWise\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Novell Groupwise allows user to bypass policies and view files\nX-Force URL:            http://xforce.iss.net/static/6089.php\n\n_____\n\nDate Reported:          2/9/01\nVulnerability:          infobot-calc-gain-access\nPlatforms Affected:     Infobot\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Infobot \u0027calc\u0027 command allows remote users to gain access\nX-Force URL:            http://xforce.iss.net/static/6078.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-sysctl-read-memory\nPlatforms Affected:     Linux\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Linux kernel sysctl() read memory\nX-Force URL:            http://xforce.iss.net/static/6079.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          openssh-bypass-authentication\nPlatforms Affected:     OpenSSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      OpenSSH 2.3.1 allows remote users to bypass authentication\nX-Force URL:            http://xforce.iss.net/static/6084.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          lotus-notes-stored-forms\nPlatforms Affected:     Lotus Notes\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Lotus Notes stored forms\nX-Force URL:            http://xforce.iss.net/static/6087.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-ptrace-modify-process\nPlatforms Affected:     Linux\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Linux kernel ptrace modify process\nX-Force URL:            http://xforce.iss.net/static/6080.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          ssh-deattack-overwrite-memory\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 deattack.c allows memory to be overwritten\nX-Force URL:            http://xforce.iss.net/static/6083.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          dc20ctrl-port-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      FreeBSD dc20ctrl port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6077.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-xklock-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      ja-xklock buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6073.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-elvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ja-elvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6074.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ko-helvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ko-helvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6075.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          serverworx-directory-traversal\nPlatforms Affected:     ServerWorx\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ServerWorx directory traversal\nX-Force URL:            http://xforce.iss.net/static/6081.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ntlm-ssp-elevate-privileges\nPlatforms Affected:     NTLM\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      NTLM Security Support Provider could allow elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6076.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ssh-session-key-recovery\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 session key recovery\nX-Force URL:            http://xforce.iss.net/static/6082.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          aolserver-directory-traversal\nPlatforms Affected:     AOLserver\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      AOLserver directory traversal\nX-Force URL:            http://xforce.iss.net/static/6069.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          chilisoft-asp-elevate-privileges\nPlatforms Affected:     Chili!Soft\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Chili!Soft ASP could allow elevated privileges\nX-Force URL:            http://xforce.iss.net/static/6072.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          win-udp-dos\nPlatforms Affected:     Windows\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Windows UDP socket denial of service\nX-Force URL:            http://xforce.iss.net/static/6070.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ssh-daemon-failed-login\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH daemon failed login attempts are not logged\nX-Force URL:            http://xforce.iss.net/static/6071.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          picserver-directory-traversal\nPlatforms Affected:     PicServer\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      PicServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6065.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-directory-traversal\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6066.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-get-dos\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server GET request denial of service\nX-Force URL:            http://xforce.iss.net/static/6068.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ibm-netcommerce-reveal-information\nPlatforms Affected:     IBM\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      IBM Net.Commerce could reveal sensitive information\nX-Force URL:            http://xforce.iss.net/static/6067.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          win-dde-elevate-privileges\nPlatforms Affected:     Windows DDE\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Windows DDE can allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6062.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          hsweb-directory-browsing\nPlatforms Affected:     HSWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      HSWeb Web Server allows attacker to browse directories\nX-Force URL:            http://xforce.iss.net/static/6061.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          sedum-directory-traversal\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6063.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          free-java-directory-traversal\nPlatforms Affected:     Free Java\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Free Java Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6064.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          goahead-directory-traversal\nPlatforms Affected:     GoAhead\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      GoAhead Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6046.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          gnuserv-tcp-cookie-overflow\nPlatforms Affected:     Gnuserv\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Gnuserv TCP enabled cookie buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6056.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          xmail-ctrlserver-bo\nPlatforms Affected:     Xmail CTRLServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      XMail CTRLServer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6060.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          netscape-webpublisher-acl-permissions\nPlatforms Affected:     Netscape Web Publisher\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netcape Web Publisher poor ACL permissions\nX-Force URL:            http://xforce.iss.net/static/6058.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          cups-httpgets-dos\nPlatforms Affected:     CUPS\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      CUPS httpGets() function denial of service\nX-Force URL:            http://xforce.iss.net/static/6043.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-get-pin\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero GET request reveals PIN information\nX-Force URL:            http://xforce.iss.net/static/6044.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-weak-permissions\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero uses weak permissions\nX-Force URL:            http://xforce.iss.net/static/6045.php\n\n_____\n\nRisk Factor Key:\n\n        High    Any vulnerability that provides an attacker with immediate\n                access into a machine, gains superuser access, or bypasses\n                a firewall.  Example:  A vulnerable Sendmail 8.6.5 version\n                that allows an intruder to execute commands on mail\n                server. \n        Medium  Any vulnerability that provides information that has a\n                high potential of giving system access to an intruder. \n                Example: A misconfigured TFTP or vulnerable NIS server\n                that allows an intruder to get the password file that\n                could contain an account with a guessable password. \n        Low     Any vulnerability that provides information that\n                potentially could lead to a compromise.  Example:  A\n                finger that allows an intruder to find out who is online\n                and potential accounts to attempt to crack passwords\n                via brute force methods. \n\n________\n\n\nISS is a leading global provider of security management solutions for\ne-business. By offering best-of-breed SAFEsuite(tm) security software,\ncomprehensive ePatrol(tm) monitoring services and industry-leading\nexpertise, ISS serves as its customers\u0027 trusted security provider\nprotecting digital assets and ensuring the availability, confidentiality and\nintegrity of computer systems and information critical to e-business\nsuccess. ISS\u0027 security management solutions protect more than 5,000\ncustomers including 21 of the 25 largest U.S. commercial banks, 9 of the 10\nlargest telecommunications companies and over 35 government agencies. \nFounded in 1994, ISS is headquartered in Atlanta, GA, with additional\noffices throughout North America and international operations in Asia,\nAustralia, Europe and Latin America. For more information, visit the ISS Web\nsite at www.iss.net or call 800-776-2362. \n\nCopyright (c) 2001 by Internet Security Systems, Inc. \n\nPermission is hereby granted for the redistribution of this Alert\nelectronically.  It is not to be edited in any way without express consent\nof the X-Force.  If you wish to reprint the whole or any part of this Alert\nin any other medium excluding electronic medium, please e-mail\nxforce@iss.net for permission. \n\nDisclaimer\n\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There are\nNO warranties with regard to this information. In no event shall the author\nbe liable for any damages whatsoever arising out of or in connection with\nthe use or spread of this information. Any use of this information is at the\nuser\u0027s own risk. \n\n\n\nX-Force PGP Key available at: http://xforce.iss.net/sensitive.php as \nwell as on MIT\u0027s PGP key server and PGP.com\u0027s key server. \n\nPlease send suggestions, updates, and comments to: X-Force xforce@iss.net\nof Internet Security Systems, Inc. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: 2.6.3a\nCharset: noconv\n\niQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV\n1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA\nh0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B\ntT+ylKw4hn4=\n=kfHg\n-----END PGP SIGNATURE-----\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      }
    ],
    "trust": 7.02
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=349",
        "trust": 0.2,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-2966",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#13877",
        "trust": 3.2
      },
      {
        "db": "BID",
        "id": "2347",
        "trust": 2.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309",
        "trust": 2.4
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0144",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "503",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "795",
        "trust": 1.8
      },
      {
        "db": "XF",
        "id": "6083",
        "trust": 1.5
      },
      {
        "db": "BID",
        "id": "5114",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "2405",
        "trust": 1.1
      },
      {
        "db": "XF",
        "id": "6135",
        "trust": 0.9
      },
      {
        "db": "XF",
        "id": "6063",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "6449",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "2335",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "6472",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20010208 [CORE SDI ADVISORY] SSH1 CRC-32 COMPENSATION ATTACK DETECTOR",
        "trust": 0.6
      },
      {
        "db": "BINDVIEW",
        "id": "20010208 REMOTE VULNERABILITY IN SSH DAEMON CRC32 COMPENSATION ATTACK DETECTOR",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2001-35",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "349",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-15322",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-74486",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "20617",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-2966",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6115",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6075",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6149",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6145",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6136",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6065",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6157",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6058",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6161",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6109",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6121",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6062",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6137",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6101",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6089",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6072",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6143",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6084",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6100",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6080",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6071",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6073",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6116",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6144",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6104",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6094",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6087",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6090",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6046",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6056",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6060",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6130",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6092",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6118",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6117",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6098",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6156",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6113",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6067",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6064",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6045",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6147",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6095",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6131",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6114",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6134",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6074",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6044",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6112",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6077",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6148",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6146",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6078",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6110",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6132",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6099",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6079",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6102",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6096",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6142",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6091",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6158",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6162",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6163",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6155",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6081",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6160",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6111",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6152",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6068",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6043",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6076",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6103",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6070",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6133",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6153",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6082",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6124",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6061",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6066",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6097",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6105",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6159",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6069",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6093",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6139",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6151",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "24431",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "id": "VAR-200103-0055",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      }
    ],
    "trust": 0.9770025999999999
  },
  "last_update_date": "2023-12-18T11:42:12.994000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "LinuxFlaw",
        "trust": 0.1,
        "url": "https://github.com/mudongliang/linuxflaw "
      },
      {
        "title": "cve-",
        "trust": 0.1,
        "url": "https://github.com/oneoy/cve- "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://www.cert.org/advisories/ca-2001-35.html"
      },
      {
        "trust": 2.6,
        "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
      },
      {
        "trust": 2.6,
        "url": "http://www.securityfocus.com/bid/2347"
      },
      {
        "trust": 2.4,
        "url": "http://www.kb.cert.org/vuls/id/13877"
      },
      {
        "trust": 2.4,
        "url": "http://www.ssh.com/products/ssh/cert/"
      },
      {
        "trust": 1.8,
        "url": "http://www.osvdb.org/503"
      },
      {
        "trust": 1.8,
        "url": "http://www.osvdb.org/795"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/945216"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/25309"
      },
      {
        "trust": 1.5,
        "url": "http://xforce.iss.net/static/6083.php"
      },
      {
        "trust": 1.2,
        "url": "http://marc.info/?l=bugtraq\u0026m=98168366406903\u0026w=2"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6083"
      },
      {
        "trust": 1.1,
        "url": "http://www.cisco.com/warp/public/707/ssh-scanning.shtml"
      },
      {
        "trust": 1.1,
        "url": "http://www.cisco.com/warp/public/707/ssh-multiple-pub.html"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6135.php"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6063.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/5114"
      },
      {
        "trust": 0.8,
        "url": "http://www.corest.com/files/files/11/crc32.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www1.corest.com/common/showdoc.php?idx=131\u0026idxseccion=10"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/static/6449.php"
      },
      {
        "trust": 0.8,
        "url": "http://www1.corest.com/common/showdoc.php?idx=81\u0026idxsection=10#"
      },
      {
        "trust": 0.8,
        "url": "http://www.openssh.com/security.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/alerts/advise100.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.cryptnet.net/fcp/audit/pgp4pine/01.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2405"
      },
      {
        "trust": 0.8,
        "url": "http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html"
      },
      {
        "trust": 0.8,
        "url": "http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html"
      },
      {
        "trust": 0.8,
        "url": "http://pgp4pine.flatline.de/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2335"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/160452"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/static/6472.php"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=98168366406903\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/support/alerts/11_06_02.html"
      },
      {
        "trust": 0.3,
        "url": "http://support.coresecurity.com/impact/exploits/56f46f9564b53fc1bca5bef469b60df7.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298289"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298274"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298288"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.rapid7.com/db/vulnerabilities/cisco-ssh-scanning-dos"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/349/"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6144.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6091.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6149.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6156.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6153.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6060.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6078.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6098.php"
      },
      {
        "trust": 0.1,
        "url": "https://www.iss.net"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6103.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6130.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6109.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6073.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6061.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6064.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6043.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6069.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6114.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6097.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6145.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6099.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6151.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6132.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6148.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6070.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6118.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6115.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6062.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6092.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6105.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6046.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6157.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6076.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6111.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6143.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6045.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6104.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6124.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6082.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6116.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6077.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6152.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6079.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6084.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6133.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6160.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6080.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6044.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6089.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6162.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6137.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6112.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6147.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6090.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6117.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6094.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6056.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6110.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/alerts/vol-6_num-4.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6074.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6155.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6058.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6102.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6121.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6139.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6146.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6081.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6095.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6071.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6159.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6134.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6100.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/maillists/index.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6101.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6096.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6066.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6113.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6093.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6065.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6087.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6068.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/sensitive.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6072.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6158.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6142.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6067.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6161.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6136.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6075.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6131.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6163.php"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-06-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "date": "2001-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "date": "2000-09-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "date": "2001-10-24T00:00:00",
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "date": "2001-07-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "date": "2001-05-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "date": "2001-01-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "date": "2001-03-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "date": "2001-03-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "BID",
        "id": "2347"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "BID",
        "id": "5114"
      },
      {
        "date": "2001-02-20T00:00:00",
        "db": "BID",
        "id": "2405"
      },
      {
        "date": "2001-03-13T23:54:42",
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "date": "2001-03-12T05:00:00",
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-12-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "date": "2003-05-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "date": "2002-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "date": "2003-05-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "date": "2002-01-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "date": "2001-06-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "date": "2002-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "date": "2018-05-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-2966"
      },
      {
        "date": "2018-05-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2001-0144"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "BID",
        "id": "2347"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "BID",
        "id": "5114"
      },
      {
        "date": "2001-02-20T00:00:00",
        "db": "BID",
        "id": "2405"
      },
      {
        "date": "2018-05-03T01:29:11.303000",
        "db": "NVD",
        "id": "CVE-2001-0144"
      },
      {
        "date": "2006-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200103-069"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Cisco products consume excessive CPU resources in response to large SSH packets",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Failure to Handle Exceptional Conditions",
    "sources": [
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      }
    ],
    "trust": 0.6
  }
}

var-200101-0122
Vulnerability from variot

The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. Secure Shell, or SSH, is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. This would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). As a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. UPDATE: There have been reports suggesting that exploitation of this vulnerability may be widespread. Since early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. NOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. Secure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. ** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. Cisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. As many of these devices are critical infrastructure components, more serious network outages may occur. Cisco has released upgrades that will eliminate this vulnerability. An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user. As a result, the user could transmit data, meant to be encrypted, as plaintext. SSH is prone to a denial-of-service vulnerability. TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to majordomo@iss.net Contact alert-owner@iss.net for help with any problems!


-----BEGIN PGP SIGNED MESSAGE-----

ISS X-Force has received reports that some individuals were unable to verify the PGP signature on the Security Alert Summary distributed earlier in the week. Due to this issue, X-Force is re-distributing the Security Alert Summary. We apologize for any inconvience this may have caused.

Internet Security Systems Security Alert Summary March 5, 2001 Volume 6 Number 4

X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php

This summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php


Contents

90 Reported Vulnerabilities

Risk Factor Key


Date Reported: 2/27/01 Vulnerability: a1-server-dos Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server denial of service X-Force URL: http://xforce.iss.net/static/6161.php


Date Reported: 2/27/01 Vulnerability: a1-server-directory-traversal Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server directory traversal X-Force URL: http://xforce.iss.net/static/6162.php


Date Reported: 2/27/01 Vulnerability: webreflex-web-server-dos Platforms Affected: WebReflex Risk Factor: Medium Attack Type: Network Based Brief Description: WebReflex Web server denial of service X-Force URL: http://xforce.iss.net/static/6163.php


Date Reported: 2/26/01 Vulnerability: sudo-bo-elevate-privileges Platforms Affected: Sudo Risk Factor: Medium Attack Type: Host Based Brief Description: Sudo buffer overflow could allow elevated user privileges X-Force URL: http://xforce.iss.net/static/6153.php


Date Reported: 2/26/01 Vulnerability: mygetright-skin-overwrite-file Platforms Affected: My GetRight Risk Factor: High Attack Type: Network Based Brief Description: My GetRight 'skin' allows remote attacker to overwrite existing files X-Force URL: http://xforce.iss.net/static/6155.php


Date Reported: 2/26/01 Vulnerability: mygetright-directory-traversal Platforms Affected: My GetRight Risk Factor: Medium Attack Type: Network Based Brief Description: My GetRight directory traversal X-Force URL: http://xforce.iss.net/static/6156.php


Date Reported: 2/26/01 Vulnerability: win2k-event-viewer-bo Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Host Based Brief Description: Windows 2000 event viewer buffer overflow X-Force URL: http://xforce.iss.net/static/6160.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-cpu-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra CPU denial of service X-Force URL: http://xforce.iss.net/static/6159.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-kernel-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra Server kernel denial of service X-Force URL: http://xforce.iss.net/static/6158.php


Date Reported: 2/23/01 Vulnerability: mercur-expn-bo Platforms Affected: MERCUR Risk Factor: High Attack Type: Network Based Brief Description: MERCUR Mailserver EXPN buffer overflow X-Force URL: http://xforce.iss.net/static/6149.php


Date Reported: 2/23/01 Vulnerability: sedum-http-dos Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP server denial of service X-Force URL: http://xforce.iss.net/static/6152.php


Date Reported: 2/23/01 Vulnerability: tru64-inetd-dos Platforms Affected: Tru64 Risk Factor: Medium Attack Type: Host Based Brief Description: Tru64 UNIX inetd denial of service X-Force URL: http://xforce.iss.net/static/6157.php


Date Reported: 2/22/01 Vulnerability: outlook-vcard-bo Platforms Affected: Microsoft Outlook Risk Factor: High Attack Type: Host Based Brief Description: Outlook and Outlook Express vCards buffer overflow X-Force URL: http://xforce.iss.net/static/6145.php


Date Reported: 2/22/01 Vulnerability: ultimatebb-cookie-member-number Platforms Affected: Ultimate Bulletin Board Risk Factor: High Attack Type: Network Based Brief Description: Ultimate Bulletin Board cookie allows attacker to change member number X-Force URL: http://xforce.iss.net/static/6144.php


Date Reported: 2/21/01 Vulnerability: ultimatebb-cookie-gain-privileges Platforms Affected: Ultimate Bulletin Board Risk Factor: Medium Attack Type: Network Based Brief Description: Ultimate Bulletin Board allows remote attacker to obtain cookie information X-Force URL: http://xforce.iss.net/static/6142.php


Date Reported: 2/21/01 Vulnerability: sendmail-elevate-privileges Platforms Affected: Sendmail Risk Factor: High Attack Type: Host Based Brief Description: Sendmail -bt command could allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6147.php


Date Reported: 2/21/01 Vulnerability: jre-jdk-execute-commands Platforms Affected: JRE/JDK Risk Factor: High Attack Type: Host Based Brief Description: JRE/JDK could allow unauthorized execution of commands X-Force URL: http://xforce.iss.net/static/6143.php


Date Reported: 2/20/01 Vulnerability: licq-remote-port-dos Platforms Affected: LICQ Risk Factor: Medium Attack Type: Network Based Brief Description: LICQ remote denial of service X-Force URL: http://xforce.iss.net/static/6134.php


Date Reported: 2/20/01 Vulnerability: pgp4pine-expired-keys Platforms Affected: pgp4pine Risk Factor: Medium Attack Type: Host Based Brief Description: pgp4pine may transmit messages using expired public keys X-Force URL: http://xforce.iss.net/static/6135.php


Date Reported: 2/20/01 Vulnerability: chilisoft-asp-view-files Platforms Affected: Chili!Soft ASP Risk Factor: High Attack Type: Network Based Brief Description: Chili!Soft ASP allows remote attackers to gain access to sensitive information X-Force URL: http://xforce.iss.net/static/6137.php


Date Reported: 2/20/01 Vulnerability: win2k-domain-controller-dos Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Network/Host Based Brief Description: Windows 2000 domain controller denial of service X-Force URL: http://xforce.iss.net/static/6136.php


Date Reported: 2/19/01 Vulnerability: asx-remote-dos Platforms Affected: ASX Switches Risk Factor: Medium Attack Type: Network Based Brief Description: ASX switches allow remote denial of service X-Force URL: http://xforce.iss.net/static/6133.php


Date Reported: 2/18/01 Vulnerability: http-cgi-mailnews-username Platforms Affected: Mailnews.cgi Risk Factor: High Attack Type: Network Based Brief Description: Mailnews.cgi allows remote attacker to execute shell commands using username X-Force URL: http://xforce.iss.net/static/6139.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-reveal-path Platforms Affected: BadBlue Risk Factor: Low Attack Type: Network Based Brief Description: BadBlue ext.dll library reveals path X-Force URL: http://xforce.iss.net/static/6130.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-dos Platforms Affected: BadBlue Risk Factor: Medium Attack Type: Network Based Brief Description: BadBlue ext.dll library denial of service X-Force URL: http://xforce.iss.net/static/6131.php


Date Reported: 2/17/01 Vulnerability: moby-netsuite-bo Platforms Affected: Moby's NetSuite Risk Factor: Medium Attack Type: Network Based Brief Description: Moby's NetSuite Web server buffer overflow X-Force URL: http://xforce.iss.net/static/6132.php


Date Reported: 2/16/01 Vulnerability: webactive-directory-traversal Platforms Affected: WEBactive Risk Factor: Medium Attack Type: Network/Host Based Brief Description: WEBactive HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6121.php


Date Reported: 2/16/01 Vulnerability: esone-cgi-directory-traversal Platforms Affected: ES.One store.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Thinking Arts ES.One store.cgi directory traversal X-Force URL: http://xforce.iss.net/static/6124.php


Date Reported: 2/16/01 Vulnerability: vshell-username-bo Platforms Affected: VShell Risk Factor: High Attack Type: Network Based Brief Description: VShell username buffer overflow X-Force URL: http://xforce.iss.net/static/6146.php


Date Reported: 2/16/01 Vulnerability: vshell-port-forwarding-rule Platforms Affected: VShell Risk Factor: Medium Attack Type: Network/Host Based Brief Description: VShell uses weak port forwarding rule X-Force URL: http://xforce.iss.net/static/6148.php


Date Reported: 2/15/01 Vulnerability: pi3web-isapi-bo Platforms Affected: Pi3Web Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Pi3Web ISAPI tstisapi.dll denial of service X-Force URL: http://xforce.iss.net/static/6113.php


Date Reported: 2/15/01 Vulnerability: pi3web-reveal-path Platforms Affected: Pi3Web Risk Factor: Low Attack Type: Network Based Brief Description: Pi3Web reveals physical path of server X-Force URL: http://xforce.iss.net/static/6114.php


Date Reported: 2/15/01 Vulnerability: bajie-execute-shell Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer execute shell commands X-Force URL: http://xforce.iss.net/static/6117.php


Date Reported: 2/15/01 Vulnerability: bajie-directory-traversal Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer directory traversal X-Force URL: http://xforce.iss.net/static/6115.php


Date Reported: 2/15/01 Vulnerability: resin-directory-traversal Platforms Affected: Resin Risk Factor: Medium Attack Type: Network Based Brief Description: Resin Web server directory traversal X-Force URL: http://xforce.iss.net/static/6118.php


Date Reported: 2/15/01 Vulnerability: netware-mitm-recover-passwords Platforms Affected: Netware Risk Factor: Low Attack Type: Network Based Brief Description: Netware "man in the middle" attack password recovery X-Force URL: http://xforce.iss.net/static/6116.php


Date Reported: 2/14/01 Vulnerability: firebox-pptp-dos Platforms Affected: WatchGuard Firebox II Risk Factor: High Attack Type: Network Based Brief Description: WatchGuard Firebox II PPTP denial of service X-Force URL: http://xforce.iss.net/static/6109.php


Date Reported: 2/14/01 Vulnerability: hp-virtualvault-iws-dos Platforms Affected: HP VirtualVault Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HP VirtualVault iPlanet Web Server denial of service X-Force URL: http://xforce.iss.net/static/6110.php


Date Reported: 2/14/01 Vulnerability: kicq-execute-commands Platforms Affected: KICQ Risk Factor: High Attack Type: Network Based Brief Description: kicq could allow remote execution of commands X-Force URL: http://xforce.iss.net/static/6112.php


Date Reported: 2/14/01 Vulnerability: hp-text-editor-bo Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP Text editors buffer overflow X-Force URL: http://xforce.iss.net/static/6111.php


Date Reported: 2/13/01 Vulnerability: sendtemp-pl-read-files Platforms Affected: sendtemp.pl Risk Factor: Medium Attack Type: Network/Host Based Brief Description: sendtemp.pl could allow an attacker to read files on the server X-Force URL: http://xforce.iss.net/static/6104.php


Date Reported: 2/13/01 Vulnerability: analog-alias-bo Platforms Affected: Analog ALIAS Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Analog ALIAS command buffer overflow X-Force URL: http://xforce.iss.net/static/6105.php


Date Reported: 2/13/01 Vulnerability: elm-long-string-bo Platforms Affected: Elm Risk Factor: Medium Attack Type: Host Based Brief Description: ELM -f command long string buffer overflow X-Force URL: http://xforce.iss.net/static/6151.php


Date Reported: 2/13/01 Vulnerability: winnt-pptp-dos Platforms Affected: Windows NT Risk Factor: Medium Attack Type: Network Based Brief Description: Windows NT PPTP denial of service X-Force URL: http://xforce.iss.net/static/6103.php


Date Reported: 2/12/01 Vulnerability: startinnfeed-format-string Platforms Affected: Inn Risk Factor: High Attack Type: Host Based Brief Description: Inn 'startinnfeed' binary format string attack X-Force URL: http://xforce.iss.net/static/6099.php


Date Reported: 2/12/01 Vulnerability: his-auktion-cgi-url Platforms Affected: HIS Auktion Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HIS Auktion CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6090.php


Date Reported: 2/12/01 Vulnerability: wayboard-cgi-view-files Platforms Affected: Way-BOARD Risk Factor: Medium Attack Type: Network Based Brief Description: Way-BOARD CGI could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6091.php


Date Reported: 2/12/01 Vulnerability: muskat-empower-url-dir Platforms Affected: Musket Empower Risk Factor: Low Attack Type: Network/Host Based Brief Description: Musket Empower could allow attackers to gain access to the DB directory path X-Force URL: http://xforce.iss.net/static/6093.php


Date Reported: 2/12/01 Vulnerability: icq-icu-rtf-dos Platforms Affected: LICQ Gnome ICU Risk Factor: Low Attack Type: Network/Host Based Brief Description: LICQ and Gnome ICU rtf file denial of service X-Force URL: http://xforce.iss.net/static/6096.php


Date Reported: 2/12/01 Vulnerability: commerce-cgi-view-files Platforms Affected: Commerce.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Commerce.cgi could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6095.php


Date Reported: 2/12/01 Vulnerability: roads-search-view-files Platforms Affected: ROADS Risk Factor: Medium Attack Type: Network Based Brief Description: ROADS could allow attackers to view unauthorized files using search.pl program X-Force URL: http://xforce.iss.net/static/6097.php


Date Reported: 2/12/01 Vulnerability: webpage-cgi-view-info Platforms Affected: WebPage.cgi Risk Factor: Low Attack Type: Network Based Brief Description: WebPage.cgi allows attackers to view sensitive information X-Force URL: http://xforce.iss.net/static/6100.php


Date Reported: 2/12/01 Vulnerability: webspirs-cgi-view-files Platforms Affected: WebSPIRS Risk Factor: Medium Attack Type: Network Based Brief Description: WebSPIRS CGI could allow an attacker to view unauthorized files X-Force URL: http://xforce.iss.net/static/6101.php


Date Reported: 2/12/01 Vulnerability: webpals-library-cgi-url Platforms Affected: WebPALS Risk Factor: Medium Attack Type: Network Based Brief Description: WebPALS Library System CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6102.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-permissions Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled with nolicense permissions X-Force URL: http://xforce.iss.net/static/6092.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-symlink Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled allows symlink in nolicense X-Force URL: http://xforce.iss.net/static/6094.php


Date Reported: 2/10/01 Vulnerability: vixie-crontab-bo Platforms Affected: Vixie crontab Risk Factor: Medium Attack Type: Host Based Brief Description: Vixie crontab buffer overflow X-Force URL: http://xforce.iss.net/static/6098.php


Date Reported: 2/10/01 Vulnerability: novell-groupwise-bypass-policies Platforms Affected: Novell GroupWise Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Novell Groupwise allows user to bypass policies and view files X-Force URL: http://xforce.iss.net/static/6089.php


Date Reported: 2/9/01 Vulnerability: infobot-calc-gain-access Platforms Affected: Infobot Risk Factor: High Attack Type: Network Based Brief Description: Infobot 'calc' command allows remote users to gain access X-Force URL: http://xforce.iss.net/static/6078.php


Date Reported: 2/8/01 Vulnerability: linux-sysctl-read-memory Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux kernel sysctl() read memory X-Force URL: http://xforce.iss.net/static/6079.php


Date Reported: 2/8/01 Vulnerability: openssh-bypass-authentication Platforms Affected: OpenSSH Risk Factor: High Attack Type: Network/Host Based Brief Description: OpenSSH 2.3.1 allows remote users to bypass authentication X-Force URL: http://xforce.iss.net/static/6084.php


Date Reported: 2/8/01 Vulnerability: lotus-notes-stored-forms Platforms Affected: Lotus Notes Risk Factor: High Attack Type: Network/Host Based Brief Description: Lotus Notes stored forms X-Force URL: http://xforce.iss.net/static/6087.php


Date Reported: 2/8/01 Vulnerability: linux-ptrace-modify-process Platforms Affected: Linux Risk Factor: High Attack Type: Host Based Brief Description: Linux kernel ptrace modify process X-Force URL: http://xforce.iss.net/static/6080.php


Date Reported: 2/8/01 Vulnerability: ssh-deattack-overwrite-memory Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 deattack.c allows memory to be overwritten X-Force URL: http://xforce.iss.net/static/6083.php


Date Reported: 2/7/01 Vulnerability: dc20ctrl-port-bo Platforms Affected: FreeBSD Risk Factor: Medium Attack Type: Host Based Brief Description: FreeBSD dc20ctrl port buffer overflow X-Force URL: http://xforce.iss.net/static/6077.php


Date Reported: 2/7/01 Vulnerability: ja-xklock-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: ja-xklock buffer overflow X-Force URL: http://xforce.iss.net/static/6073.php


Date Reported: 2/7/01 Vulnerability: ja-elvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ja-elvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6074.php


Date Reported: 2/7/01 Vulnerability: ko-helvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ko-helvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6075.php


Date Reported: 2/7/01 Vulnerability: serverworx-directory-traversal Platforms Affected: ServerWorx Risk Factor: Medium Attack Type: Network Based Brief Description: ServerWorx directory traversal X-Force URL: http://xforce.iss.net/static/6081.php


Date Reported: 2/7/01 Vulnerability: ntlm-ssp-elevate-privileges Platforms Affected: NTLM Risk Factor: High Attack Type: Host Based Brief Description: NTLM Security Support Provider could allow elevation of privileges X-Force URL: http://xforce.iss.net/static/6076.php


Date Reported: 2/7/01 Vulnerability: ssh-session-key-recovery Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 session key recovery X-Force URL: http://xforce.iss.net/static/6082.php


Date Reported: 2/6/01 Vulnerability: aolserver-directory-traversal Platforms Affected: AOLserver Risk Factor: Medium Attack Type: Network Based Brief Description: AOLserver directory traversal X-Force URL: http://xforce.iss.net/static/6069.php


Date Reported: 2/6/01 Vulnerability: chilisoft-asp-elevate-privileges Platforms Affected: Chili!Soft Risk Factor: High Attack Type: Network/Host Based Brief Description: Chili!Soft ASP could allow elevated privileges X-Force URL: http://xforce.iss.net/static/6072.php


Date Reported: 2/6/01 Vulnerability: win-udp-dos Platforms Affected: Windows Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Windows UDP socket denial of service X-Force URL: http://xforce.iss.net/static/6070.php


Date Reported: 2/5/01 Vulnerability: ssh-daemon-failed-login Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH daemon failed login attempts are not logged X-Force URL: http://xforce.iss.net/static/6071.php


Date Reported: 2/5/01 Vulnerability: picserver-directory-traversal Platforms Affected: PicServer Risk Factor: Medium Attack Type: Network Based Brief Description: PicServer directory traversal X-Force URL: http://xforce.iss.net/static/6065.php


Date Reported: 2/5/01 Vulnerability: biblioweb-directory-traversal Platforms Affected: BiblioWeb Risk Factor: Medium Attack Type: Network Based Brief Description: BiblioWeb Server directory traversal X-Force URL: http://xforce.iss.net/static/6066.php


Date Reported: 2/5/01 Vulnerability: biblioweb-get-dos Platforms Affected: BiblioWeb Risk Factor: Low Attack Type: Network Based Brief Description: BiblioWeb Server GET request denial of service X-Force URL: http://xforce.iss.net/static/6068.php


Date Reported: 2/5/01 Vulnerability: ibm-netcommerce-reveal-information Platforms Affected: IBM Risk Factor: Medium Attack Type: Network/Host Based Brief Description: IBM Net.Commerce could reveal sensitive information X-Force URL: http://xforce.iss.net/static/6067.php


Date Reported: 2/5/01 Vulnerability: win-dde-elevate-privileges Platforms Affected: Windows DDE Risk Factor: High Attack Type: Host Based Brief Description: Windows DDE can allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6062.php


Date Reported: 2/4/01 Vulnerability: hsweb-directory-browsing Platforms Affected: HSWeb Risk Factor: Low Attack Type: Network Based Brief Description: HSWeb Web Server allows attacker to browse directories X-Force URL: http://xforce.iss.net/static/6061.php


Date Reported: 2/4/01 Vulnerability: sedum-directory-traversal Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6063.php


Date Reported: 2/4/01 Vulnerability: free-java-directory-traversal Platforms Affected: Free Java Risk Factor: Medium Attack Type: Network Based Brief Description: Free Java Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6064.php


Date Reported: 2/2/01 Vulnerability: goahead-directory-traversal Platforms Affected: GoAhead Risk Factor: High Attack Type: Network Based Brief Description: GoAhead Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6046.php


Date Reported: 2/2/01 Vulnerability: gnuserv-tcp-cookie-overflow Platforms Affected: Gnuserv Risk Factor: High Attack Type: Network/Host Based Brief Description: Gnuserv TCP enabled cookie buffer overflow X-Force URL: http://xforce.iss.net/static/6056.php


Date Reported: 2/2/01 Vulnerability: xmail-ctrlserver-bo Platforms Affected: Xmail CTRLServer Risk Factor: High Attack Type: Network Based Brief Description: XMail CTRLServer buffer overflow X-Force URL: http://xforce.iss.net/static/6060.php


Date Reported: 2/2/01 Vulnerability: netscape-webpublisher-acl-permissions Platforms Affected: Netscape Web Publisher Risk Factor: Medium Attack Type: Network Based Brief Description: Netcape Web Publisher poor ACL permissions X-Force URL: http://xforce.iss.net/static/6058.php


Date Reported: 2/1/01 Vulnerability: cups-httpgets-dos Platforms Affected: CUPS Risk Factor: High Attack Type: Host Based Brief Description: CUPS httpGets() function denial of service X-Force URL: http://xforce.iss.net/static/6043.php


Date Reported: 2/1/01 Vulnerability: prospero-get-pin Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero GET request reveals PIN information X-Force URL: http://xforce.iss.net/static/6044.php


Date Reported: 2/1/01 Vulnerability: prospero-weak-permissions Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero uses weak permissions X-Force URL: http://xforce.iss.net/static/6045.php


Risk Factor Key:

    High    Any vulnerability that provides an attacker with immediate
            access into a machine, gains superuser access, or bypasses
            a firewall.  Example:  A vulnerable Sendmail 8.6.5 version
            that allows an intruder to execute commands on mail
            server. 
    Medium  Any vulnerability that provides information that has a
            high potential of giving system access to an intruder. 
            Example: A misconfigured TFTP or vulnerable NIS server
            that allows an intruder to get the password file that
            could contain an account with a guessable password. 
    Low     Any vulnerability that provides information that
            potentially could lead to a compromise.  Example:  A
            finger that allows an intruder to find out who is online
            and potential accounts to attempt to crack passwords
            via brute force methods.

ISS is a leading global provider of security management solutions for e-business. By offering best-of-breed SAFEsuite(tm) security software, comprehensive ePatrol(tm) monitoring services and industry-leading expertise, ISS serves as its customers' trusted security provider protecting digital assets and ensuring the availability, confidentiality and integrity of computer systems and information critical to e-business success. ISS' security management solutions protect more than 5,000 customers including 21 of the 25 largest U.S. commercial banks, 9 of the 10 largest telecommunications companies and over 35 government agencies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe and Latin America. For more information, visit the ISS Web site at www.iss.net or call 800-776-2362.

Copyright (c) 2001 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv

iQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV 1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA h0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B tT+ylKw4hn4= =kfHg -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200101-0122",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 3.2,
        "vendor": "ssh security",
        "version": null
      },
      {
        "model": "catalyst csx",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "60005.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "openssh",
        "version": null
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.25"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.28"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.26"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.29"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.30"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.24"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ssh",
        "version": "1.2.27"
      },
      {
        "model": "ios 12.1 ex",
        "scope": null,
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60006.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60005.5"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "core sdi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "smoothwall",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "holger lamm",
        "version": null
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.30"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.29"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.28"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.27"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.26"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.24"
      },
      {
        "model": "ios 12.2xq",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xh",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xe",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xd",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xa",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2t",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "ios 12.1yf",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yd",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yc",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yb",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xu",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xt",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xq",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xp",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xm",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xl",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xj",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xi",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xh",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xg",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xf",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xc",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xb",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1t",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ec",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1e",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0s",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "60006.2(0.110)"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.25"
      },
      {
        "model": "computing safeword agent for ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "secure",
        "version": "1.0"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.2"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.1.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "1.2.3"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "1.2.2"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(1)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(5)"
      },
      {
        "model": "ios 12.1ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1xv"
      },
      {
        "model": "ios 12.1xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ez",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ey",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ex",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.10s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.4"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.3"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.2"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.1"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.0"
      },
      {
        "model": "openssh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.3"
      },
      {
        "model": "webns b11s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "webns 1b6s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "webns 0b22s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "webns 1b42s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0(1)"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(2)"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(6)"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2(3)"
      },
      {
        "model": "ios 12.2 t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2(1.1)"
      },
      {
        "model": "ios 12.2 xq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xd1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ec3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ez1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yd2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yb4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xy6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv3"
      },
      {
        "model": "ios 12.1 xu1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xr2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xg5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xm4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xp4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst pan",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3"
      },
      {
        "model": "catalyst",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.2(0.111)"
      },
      {
        "model": "catalyst",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(2.13)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios 12.2yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ye",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0xv"
      },
      {
        "model": "ios 12.0xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0st",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "css11000 content services switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60007.1(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60007.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3(4)"
      },
      {
        "model": "catalyst pan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.2(0.111)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(2.13)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(4)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(3)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(13)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(4)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(3)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4"
      },
      {
        "model": "lamm pgp4pine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "holger",
        "version": "1.75.6"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "BID",
        "id": "89758"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovered by Michal Zalewski \u003clcamtuf@bos.bindview.com\u003e on Feb 8, 2001.",
    "sources": [
      {
        "db": "BID",
        "id": "2347"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2001-1470",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2001-1470",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#290140",
            "trust": 0.8,
            "value": "21.09"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#13877",
            "trust": 0.8,
            "value": "6.84"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#25309",
            "trust": 0.8,
            "value": "0.39"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#945216",
            "trust": 0.8,
            "value": "99.00"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#566640",
            "trust": 0.8,
            "value": "0.68"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#651994",
            "trust": 0.8,
            "value": "1.50"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#315308",
            "trust": 0.8,
            "value": "2.06"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200101-127",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the message. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. Secure Shell, or SSH, is an encrypted remote access protocol.  SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications.  An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. \nThis would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer.  The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). \nAs a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker.  This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. \n**UPDATE**:\nThere have been reports suggesting that exploitation of this vulnerability may be widespread. \nSince early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet.  Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. \nNOTE: Cisco 11000 Content Service Switch family is  vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. \nSecure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. \n** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. \nCisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption.  The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets.  As many of these devices are critical infrastructure components, more serious network outages may occur. \nCisco has released upgrades that will eliminate this vulnerability.  An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user.  As a result, the user could transmit data, meant to be encrypted, as plaintext. SSH is prone to a denial-of-service vulnerability. \nTO UNSUBSCRIBE: email \"unsubscribe alert\" in the body of your message to\nmajordomo@iss.net  Contact alert-owner@iss.net for help with any problems!\n---------------------------------------------------------------------------\n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nISS X-Force has received reports that some individuals were unable to \nverify the PGP signature on the Security Alert Summary distributed earlier \nin the week. Due to this issue, X-Force is re-distributing the Security \nAlert Summary. We apologize for any inconvience this may have caused. \n\nInternet Security Systems Security Alert Summary\nMarch 5, 2001\nVolume 6 Number 4\n\nX-Force Vulnerability and Threat Database: http://xforce.iss.net/ To\nreceive these Alert Summaries as well as other Alerts and Advisories,\nsubscribe to the Internet Security Systems Alert mailing list at:\nhttp://xforce.iss.net/maillists/index.php\n\nThis summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php\n_____\n\nContents\n\n90 Reported Vulnerabilities\n\nRisk Factor Key\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-dos\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6161.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-directory-traversal\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6162.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          webreflex-web-server-dos\nPlatforms Affected:     WebReflex\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebReflex Web server denial of service\nX-Force URL:            http://xforce.iss.net/static/6163.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          sudo-bo-elevate-privileges\nPlatforms Affected:     Sudo\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Sudo buffer overflow could allow elevated user privileges\nX-Force URL:            http://xforce.iss.net/static/6153.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-skin-overwrite-file\nPlatforms Affected:     My GetRight\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      My GetRight \u0027skin\u0027 allows remote attacker to overwrite existing files\nX-Force URL:            http://xforce.iss.net/static/6155.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-directory-traversal\nPlatforms Affected:     My GetRight\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      My GetRight directory traversal\nX-Force URL:            http://xforce.iss.net/static/6156.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          win2k-event-viewer-bo\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Host Based\nBrief Description:      Windows 2000 event viewer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6160.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-cpu-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra CPU denial of service\nX-Force URL:            http://xforce.iss.net/static/6159.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-kernel-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra Server kernel denial of service\nX-Force URL:            http://xforce.iss.net/static/6158.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          mercur-expn-bo\nPlatforms Affected:     MERCUR\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      MERCUR Mailserver EXPN buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6149.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          sedum-http-dos\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP server denial of service\nX-Force URL:            http://xforce.iss.net/static/6152.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          tru64-inetd-dos\nPlatforms Affected:     Tru64\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Tru64 UNIX inetd denial of service\nX-Force URL:            http://xforce.iss.net/static/6157.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          outlook-vcard-bo\nPlatforms Affected:     Microsoft Outlook\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Outlook and Outlook Express vCards buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6145.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          ultimatebb-cookie-member-number\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board cookie allows attacker to change member number\nX-Force URL:            http://xforce.iss.net/static/6144.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          ultimatebb-cookie-gain-privileges\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board allows remote attacker to obtain cookie information\nX-Force URL:            http://xforce.iss.net/static/6142.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          sendmail-elevate-privileges\nPlatforms Affected:     Sendmail\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Sendmail -bt command could allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6147.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          jre-jdk-execute-commands\nPlatforms Affected:     JRE/JDK\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      JRE/JDK could allow unauthorized execution of commands\nX-Force URL:            http://xforce.iss.net/static/6143.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          licq-remote-port-dos\nPlatforms Affected:     LICQ\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      LICQ remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6134.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          pgp4pine-expired-keys\nPlatforms Affected:     pgp4pine\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      pgp4pine may transmit messages using expired public keys\nX-Force URL:            http://xforce.iss.net/static/6135.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          chilisoft-asp-view-files\nPlatforms Affected:     Chili!Soft ASP\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Chili!Soft ASP allows remote attackers to gain access to sensitive information\nX-Force URL:            http://xforce.iss.net/static/6137.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          win2k-domain-controller-dos\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Network/Host Based\nBrief Description:      Windows 2000 domain controller denial of service\nX-Force URL:            http://xforce.iss.net/static/6136.php\n\n_____\n\nDate Reported:          2/19/01\nVulnerability:          asx-remote-dos\nPlatforms Affected:     ASX Switches\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ASX switches allow remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6133.php\n\n_____\n\nDate Reported:          2/18/01\nVulnerability:          http-cgi-mailnews-username\nPlatforms Affected:     Mailnews.cgi\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Mailnews.cgi allows remote attacker to execute shell commands using username\nX-Force URL:            http://xforce.iss.net/static/6139.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-reveal-path\nPlatforms Affected:     BadBlue\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library reveals path\nX-Force URL:            http://xforce.iss.net/static/6130.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-dos\nPlatforms Affected:     BadBlue\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library denial of service\nX-Force URL:            http://xforce.iss.net/static/6131.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          moby-netsuite-bo\nPlatforms Affected:     Moby\u0027s NetSuite\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Moby\u0027s NetSuite Web server buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6132.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          webactive-directory-traversal\nPlatforms Affected:     WEBactive\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      WEBactive HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6121.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          esone-cgi-directory-traversal\nPlatforms Affected:     ES.One store.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Thinking Arts ES.One store.cgi directory traversal\nX-Force URL:            http://xforce.iss.net/static/6124.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-username-bo\nPlatforms Affected:     VShell\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      VShell username buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6146.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-port-forwarding-rule\nPlatforms Affected:     VShell\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      VShell uses weak port forwarding rule\nX-Force URL:            http://xforce.iss.net/static/6148.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-isapi-bo\nPlatforms Affected:     Pi3Web\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Pi3Web ISAPI tstisapi.dll denial of service\nX-Force URL:            http://xforce.iss.net/static/6113.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-reveal-path\nPlatforms Affected:     Pi3Web\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Pi3Web reveals physical path of server\nX-Force URL:            http://xforce.iss.net/static/6114.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-execute-shell\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer execute shell commands\nX-Force URL:            http://xforce.iss.net/static/6117.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-directory-traversal\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6115.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          resin-directory-traversal\nPlatforms Affected:     Resin\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Resin Web server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6118.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          netware-mitm-recover-passwords\nPlatforms Affected:     Netware\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Netware \"man in the middle\" attack password recovery\nX-Force URL:            http://xforce.iss.net/static/6116.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          firebox-pptp-dos\nPlatforms Affected:     WatchGuard Firebox II\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      WatchGuard Firebox II PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6109.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-virtualvault-iws-dos\nPlatforms Affected:     HP VirtualVault\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HP VirtualVault iPlanet Web Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6110.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          kicq-execute-commands\nPlatforms Affected:     KICQ\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      kicq could allow remote execution of commands\nX-Force URL:            http://xforce.iss.net/static/6112.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-text-editor-bo\nPlatforms Affected:     HPUX\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      HP Text editors buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6111.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          sendtemp-pl-read-files\nPlatforms Affected:     sendtemp.pl\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      sendtemp.pl could allow an attacker to read files on the server\nX-Force URL:            http://xforce.iss.net/static/6104.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          analog-alias-bo\nPlatforms Affected:     Analog ALIAS\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Analog ALIAS command buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6105.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          elm-long-string-bo\nPlatforms Affected:     Elm\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      ELM -f command long string buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6151.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          winnt-pptp-dos\nPlatforms Affected:     Windows NT\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Windows NT PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6103.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          startinnfeed-format-string\nPlatforms Affected:     Inn\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Inn \u0027startinnfeed\u0027 binary format string attack\nX-Force URL:            http://xforce.iss.net/static/6099.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          his-auktion-cgi-url\nPlatforms Affected:     HIS Auktion\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HIS Auktion CGI script could allow attackers to view unauthorized \n                        files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6090.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          wayboard-cgi-view-files\nPlatforms Affected:     Way-BOARD\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Way-BOARD CGI could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6091.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          muskat-empower-url-dir\nPlatforms Affected:     Musket Empower\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      Musket Empower could allow attackers to gain access to the DB directory path\nX-Force URL:            http://xforce.iss.net/static/6093.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          icq-icu-rtf-dos\nPlatforms Affected:     LICQ\n                        Gnome ICU\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      LICQ and Gnome ICU rtf file denial of service\nX-Force URL:            http://xforce.iss.net/static/6096.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          commerce-cgi-view-files\nPlatforms Affected:     Commerce.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Commerce.cgi could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6095.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          roads-search-view-files\nPlatforms Affected:     ROADS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ROADS could allow attackers to view unauthorized files using search.pl program\nX-Force URL:            http://xforce.iss.net/static/6097.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpage-cgi-view-info\nPlatforms Affected:     WebPage.cgi\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      WebPage.cgi allows attackers to view sensitive information\nX-Force URL:            http://xforce.iss.net/static/6100.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webspirs-cgi-view-files\nPlatforms Affected:     WebSPIRS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebSPIRS CGI could allow an attacker to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6101.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpals-library-cgi-url\nPlatforms Affected:     WebPALS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebPALS Library System CGI script could allow attackers to view \n                        unauthorized files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6102.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-permissions\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled with nolicense permissions\nX-Force URL:            http://xforce.iss.net/static/6092.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-symlink\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled allows symlink in nolicense\nX-Force URL:            http://xforce.iss.net/static/6094.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          vixie-crontab-bo\nPlatforms Affected:     Vixie crontab\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Vixie crontab buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6098.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          novell-groupwise-bypass-policies\nPlatforms Affected:     Novell GroupWise\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Novell Groupwise allows user to bypass policies and view files\nX-Force URL:            http://xforce.iss.net/static/6089.php\n\n_____\n\nDate Reported:          2/9/01\nVulnerability:          infobot-calc-gain-access\nPlatforms Affected:     Infobot\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Infobot \u0027calc\u0027 command allows remote users to gain access\nX-Force URL:            http://xforce.iss.net/static/6078.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-sysctl-read-memory\nPlatforms Affected:     Linux\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Linux kernel sysctl() read memory\nX-Force URL:            http://xforce.iss.net/static/6079.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          openssh-bypass-authentication\nPlatforms Affected:     OpenSSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      OpenSSH 2.3.1 allows remote users to bypass authentication\nX-Force URL:            http://xforce.iss.net/static/6084.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          lotus-notes-stored-forms\nPlatforms Affected:     Lotus Notes\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Lotus Notes stored forms\nX-Force URL:            http://xforce.iss.net/static/6087.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-ptrace-modify-process\nPlatforms Affected:     Linux\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Linux kernel ptrace modify process\nX-Force URL:            http://xforce.iss.net/static/6080.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          ssh-deattack-overwrite-memory\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 deattack.c allows memory to be overwritten\nX-Force URL:            http://xforce.iss.net/static/6083.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          dc20ctrl-port-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      FreeBSD dc20ctrl port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6077.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-xklock-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      ja-xklock buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6073.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-elvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ja-elvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6074.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ko-helvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ko-helvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6075.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          serverworx-directory-traversal\nPlatforms Affected:     ServerWorx\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ServerWorx directory traversal\nX-Force URL:            http://xforce.iss.net/static/6081.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ntlm-ssp-elevate-privileges\nPlatforms Affected:     NTLM\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      NTLM Security Support Provider could allow elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6076.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ssh-session-key-recovery\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 session key recovery\nX-Force URL:            http://xforce.iss.net/static/6082.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          aolserver-directory-traversal\nPlatforms Affected:     AOLserver\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      AOLserver directory traversal\nX-Force URL:            http://xforce.iss.net/static/6069.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          chilisoft-asp-elevate-privileges\nPlatforms Affected:     Chili!Soft\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Chili!Soft ASP could allow elevated privileges\nX-Force URL:            http://xforce.iss.net/static/6072.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          win-udp-dos\nPlatforms Affected:     Windows\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Windows UDP socket denial of service\nX-Force URL:            http://xforce.iss.net/static/6070.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ssh-daemon-failed-login\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH daemon failed login attempts are not logged\nX-Force URL:            http://xforce.iss.net/static/6071.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          picserver-directory-traversal\nPlatforms Affected:     PicServer\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      PicServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6065.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-directory-traversal\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6066.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-get-dos\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server GET request denial of service\nX-Force URL:            http://xforce.iss.net/static/6068.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ibm-netcommerce-reveal-information\nPlatforms Affected:     IBM\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      IBM Net.Commerce could reveal sensitive information\nX-Force URL:            http://xforce.iss.net/static/6067.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          win-dde-elevate-privileges\nPlatforms Affected:     Windows DDE\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Windows DDE can allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6062.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          hsweb-directory-browsing\nPlatforms Affected:     HSWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      HSWeb Web Server allows attacker to browse directories\nX-Force URL:            http://xforce.iss.net/static/6061.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          sedum-directory-traversal\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6063.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          free-java-directory-traversal\nPlatforms Affected:     Free Java\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Free Java Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6064.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          goahead-directory-traversal\nPlatforms Affected:     GoAhead\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      GoAhead Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6046.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          gnuserv-tcp-cookie-overflow\nPlatforms Affected:     Gnuserv\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Gnuserv TCP enabled cookie buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6056.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          xmail-ctrlserver-bo\nPlatforms Affected:     Xmail CTRLServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      XMail CTRLServer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6060.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          netscape-webpublisher-acl-permissions\nPlatforms Affected:     Netscape Web Publisher\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netcape Web Publisher poor ACL permissions\nX-Force URL:            http://xforce.iss.net/static/6058.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          cups-httpgets-dos\nPlatforms Affected:     CUPS\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      CUPS httpGets() function denial of service\nX-Force URL:            http://xforce.iss.net/static/6043.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-get-pin\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero GET request reveals PIN information\nX-Force URL:            http://xforce.iss.net/static/6044.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-weak-permissions\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero uses weak permissions\nX-Force URL:            http://xforce.iss.net/static/6045.php\n\n_____\n\nRisk Factor Key:\n\n        High    Any vulnerability that provides an attacker with immediate\n                access into a machine, gains superuser access, or bypasses\n                a firewall.  Example:  A vulnerable Sendmail 8.6.5 version\n                that allows an intruder to execute commands on mail\n                server. \n        Medium  Any vulnerability that provides information that has a\n                high potential of giving system access to an intruder. \n                Example: A misconfigured TFTP or vulnerable NIS server\n                that allows an intruder to get the password file that\n                could contain an account with a guessable password. \n        Low     Any vulnerability that provides information that\n                potentially could lead to a compromise.  Example:  A\n                finger that allows an intruder to find out who is online\n                and potential accounts to attempt to crack passwords\n                via brute force methods. \n\n________\n\n\nISS is a leading global provider of security management solutions for\ne-business. By offering best-of-breed SAFEsuite(tm) security software,\ncomprehensive ePatrol(tm) monitoring services and industry-leading\nexpertise, ISS serves as its customers\u0027 trusted security provider\nprotecting digital assets and ensuring the availability, confidentiality and\nintegrity of computer systems and information critical to e-business\nsuccess. ISS\u0027 security management solutions protect more than 5,000\ncustomers including 21 of the 25 largest U.S. commercial banks, 9 of the 10\nlargest telecommunications companies and over 35 government agencies. \nFounded in 1994, ISS is headquartered in Atlanta, GA, with additional\noffices throughout North America and international operations in Asia,\nAustralia, Europe and Latin America. For more information, visit the ISS Web\nsite at www.iss.net or call 800-776-2362. \n\nCopyright (c) 2001 by Internet Security Systems, Inc. \n\nPermission is hereby granted for the redistribution of this Alert\nelectronically.  It is not to be edited in any way without express consent\nof the X-Force.  If you wish to reprint the whole or any part of this Alert\nin any other medium excluding electronic medium, please e-mail\nxforce@iss.net for permission. \n\nDisclaimer\n\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There are\nNO warranties with regard to this information. In no event shall the author\nbe liable for any damages whatsoever arising out of or in connection with\nthe use or spread of this information. Any use of this information is at the\nuser\u0027s own risk. \n\n\n\nX-Force PGP Key available at: http://xforce.iss.net/sensitive.php as \nwell as on MIT\u0027s PGP key server and PGP.com\u0027s key server. \n\nPlease send suggestions, updates, and comments to: X-Force xforce@iss.net\nof Internet Security Systems, Inc. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: 2.6.3a\nCharset: noconv\n\niQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV\n1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA\nh0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B\ntT+ylKw4hn4=\n=kfHg\n-----END PGP SIGNATURE-----\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "BID",
        "id": "89758"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      }
    ],
    "trust": 7.11
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#13877",
        "trust": 3.2
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308",
        "trust": 2.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216",
        "trust": 2.4
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309",
        "trust": 2.4
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1470",
        "trust": 1.9
      },
      {
        "db": "XF",
        "id": "6472",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "5114",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "2347",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "2405",
        "trust": 1.1
      },
      {
        "db": "XF",
        "id": "6083",
        "trust": 0.9
      },
      {
        "db": "XF",
        "id": "6135",
        "trust": 0.9
      },
      {
        "db": "XF",
        "id": "6063",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "6449",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "2335",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200101-127",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "89758",
        "trust": 0.3
      },
      {
        "db": "XF",
        "id": "6115",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6075",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6149",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6145",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6136",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6065",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6157",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6058",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6161",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6109",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6121",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6062",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6137",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6101",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6089",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6072",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6143",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6084",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6100",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6080",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6071",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6073",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6116",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6144",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6104",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6094",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6087",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6090",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6046",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6056",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6060",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6130",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6092",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6118",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6117",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6098",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6156",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6113",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6067",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6064",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6045",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6147",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6095",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6131",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6114",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6134",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6074",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6044",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6112",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6077",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6148",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6146",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6078",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6110",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6132",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6099",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6079",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6102",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6096",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6142",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6091",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6158",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6162",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6163",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6155",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6081",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6160",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6111",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6152",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6068",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6043",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6076",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6103",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6070",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6133",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6153",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6082",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6124",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6061",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6066",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6097",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6105",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6159",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6069",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6093",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6139",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6151",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "24431",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "BID",
        "id": "89758"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "id": "VAR-200101-0122",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.8770026
  },
  "last_update_date": "2023-12-18T11:03:57.595000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.kb.cert.org/vuls/id/13877"
      },
      {
        "trust": 2.4,
        "url": "http://www.ssh.com/products/ssh/cert/"
      },
      {
        "trust": 1.9,
        "url": "http://www.kb.cert.org/vuls/id/315308"
      },
      {
        "trust": 1.6,
        "url": "http://www.cert.org/advisories/ca-2001-35.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/945216"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/25309"
      },
      {
        "trust": 1.1,
        "url": "http://www.cisco.com/warp/public/707/ssh-scanning.shtml"
      },
      {
        "trust": 1.1,
        "url": "http://www.cisco.com/warp/public/707/ssh-multiple-pub.html"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6472"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6083.php"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6135.php"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6063.php"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/xforce/xfdb/6472"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/5114"
      },
      {
        "trust": 0.8,
        "url": "http://www.corest.com/files/files/11/crc32.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www1.corest.com/common/showdoc.php?idx=131\u0026idxseccion=10"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/static/6449.php"
      },
      {
        "trust": 0.8,
        "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
      },
      {
        "trust": 0.8,
        "url": "http://www1.corest.com/common/showdoc.php?idx=81\u0026idxsection=10#"
      },
      {
        "trust": 0.8,
        "url": "http://www.openssh.com/security.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2347"
      },
      {
        "trust": 0.8,
        "url": "http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/alerts/advise100.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.cryptnet.net/fcp/audit/pgp4pine/01.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2405"
      },
      {
        "trust": 0.8,
        "url": "http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html"
      },
      {
        "trust": 0.8,
        "url": "http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html"
      },
      {
        "trust": 0.8,
        "url": "http://pgp4pine.flatline.de/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2335"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/160452"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/static/6472.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/support/alerts/11_06_02.html"
      },
      {
        "trust": 0.3,
        "url": "http://support.coresecurity.com/impact/exploits/56f46f9564b53fc1bca5bef469b60df7.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298289"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298274"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298288"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6144.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6091.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6149.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6156.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6153.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6060.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6078.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6098.php"
      },
      {
        "trust": 0.1,
        "url": "https://www.iss.net"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6103.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6130.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6109.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6073.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6061.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6064.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6043.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6069.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6114.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6097.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6145.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6099.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6151.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6132.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6148.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6070.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6118.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6115.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6062.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6092.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6105.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6046.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6157.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6076.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6111.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6143.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6045.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6104.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6124.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6082.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6116.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6077.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6152.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6079.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6084.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6133.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6160.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6080.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6044.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6089.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6162.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6137.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6112.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6147.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6090.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6117.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6094.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6056.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6110.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/alerts/vol-6_num-4.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6074.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6155.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6058.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6102.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6121.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6139.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6146.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6081.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6095.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6071.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6159.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6134.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6100.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/maillists/index.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6101.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6096.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6066.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6113.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6093.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6065.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6087.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6068.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/sensitive.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6072.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6158.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6142.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6067.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6161.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6136.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6075.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6131.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6163.php"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "89758"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "BID",
        "id": "89758"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-06-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "date": "2001-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "date": "2000-09-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "date": "2001-10-24T00:00:00",
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "date": "2001-07-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "date": "2001-05-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "date": "2001-01-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "BID",
        "id": "2347"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "BID",
        "id": "5114"
      },
      {
        "date": "2001-02-20T00:00:00",
        "db": "BID",
        "id": "2405"
      },
      {
        "date": "2001-01-18T00:00:00",
        "db": "BID",
        "id": "89758"
      },
      {
        "date": "2001-03-13T23:54:42",
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "date": "2001-01-18T05:00:00",
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "date": "2001-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-12-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "date": "2003-05-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "date": "2002-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "date": "2003-05-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "date": "2002-01-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "date": "2001-06-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "date": "2002-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "BID",
        "id": "2347"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "BID",
        "id": "5114"
      },
      {
        "date": "2001-02-20T00:00:00",
        "db": "BID",
        "id": "2405"
      },
      {
        "date": "2001-01-18T00:00:00",
        "db": "BID",
        "id": "89758"
      },
      {
        "date": "2017-07-11T01:29:08.960000",
        "db": "NVD",
        "id": "CVE-2001-1470"
      },
      {
        "date": "2006-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200101-127"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "89758"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Cisco products consume excessive CPU resources in response to large SSH packets",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Failure to Handle Exceptional Conditions",
    "sources": [
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      }
    ],
    "trust": 0.6
  }
}

var-200106-0080
Vulnerability from variot

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5. An implementation problem in at least one Secure Shell (SSH) product and a weakness in the PKCS#1_1.5 public key encryption standard allows attackers to recover plaintext of messages encrypted with SSH. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. This would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). As a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. UPDATE: There have been reports suggesting that exploitation of this vulnerability may be widespread. Since early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. NOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. Secure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. ** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. The data encryption techniques described in RSA's PKCS #1 standard are used in many protocols which rely on, at least in part, the security provided by public-key cryptography systems. Several protocols which implement the digital enveloping method described in version 1.5 of the PKCS #1 standard are susceptible to an adaptive ciphertext attack which may allow the recovery of session keys, thus compromising the integrity of the data transmitting during that session. By capturing and logging the packets transmitted between a client and a server, an opponent could make use of a captured encrypted session key to launch a Bleichenbacher attack together with a simple timing attack. If the session key is successfully decrypted, the saved packets can easily be decrypted in a uniform manner. Interactive key establishment protocols, such as SSH or SSL, are generally significantly more susceptible to successful attacks. Cisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. As many of these devices are critical infrastructure components, more serious network outages may occur. Cisco has released upgrades that will eliminate this vulnerability. An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user. As a result, the user could transmit data, meant to be encrypted, as plaintext. TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to majordomo@iss.net Contact alert-owner@iss.net for help with any problems!


-----BEGIN PGP SIGNED MESSAGE-----

ISS X-Force has received reports that some individuals were unable to verify the PGP signature on the Security Alert Summary distributed earlier in the week. Due to this issue, X-Force is re-distributing the Security Alert Summary. We apologize for any inconvience this may have caused.

Internet Security Systems Security Alert Summary March 5, 2001 Volume 6 Number 4

X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php

This summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php


Contents

90 Reported Vulnerabilities

Risk Factor Key


Date Reported: 2/27/01 Vulnerability: a1-server-dos Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server denial of service X-Force URL: http://xforce.iss.net/static/6161.php


Date Reported: 2/27/01 Vulnerability: a1-server-directory-traversal Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server directory traversal X-Force URL: http://xforce.iss.net/static/6162.php


Date Reported: 2/27/01 Vulnerability: webreflex-web-server-dos Platforms Affected: WebReflex Risk Factor: Medium Attack Type: Network Based Brief Description: WebReflex Web server denial of service X-Force URL: http://xforce.iss.net/static/6163.php


Date Reported: 2/26/01 Vulnerability: sudo-bo-elevate-privileges Platforms Affected: Sudo Risk Factor: Medium Attack Type: Host Based Brief Description: Sudo buffer overflow could allow elevated user privileges X-Force URL: http://xforce.iss.net/static/6153.php


Date Reported: 2/26/01 Vulnerability: mygetright-skin-overwrite-file Platforms Affected: My GetRight Risk Factor: High Attack Type: Network Based Brief Description: My GetRight 'skin' allows remote attacker to overwrite existing files X-Force URL: http://xforce.iss.net/static/6155.php


Date Reported: 2/26/01 Vulnerability: mygetright-directory-traversal Platforms Affected: My GetRight Risk Factor: Medium Attack Type: Network Based Brief Description: My GetRight directory traversal X-Force URL: http://xforce.iss.net/static/6156.php


Date Reported: 2/26/01 Vulnerability: win2k-event-viewer-bo Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Host Based Brief Description: Windows 2000 event viewer buffer overflow X-Force URL: http://xforce.iss.net/static/6160.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-cpu-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra CPU denial of service X-Force URL: http://xforce.iss.net/static/6159.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-kernel-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra Server kernel denial of service X-Force URL: http://xforce.iss.net/static/6158.php


Date Reported: 2/23/01 Vulnerability: mercur-expn-bo Platforms Affected: MERCUR Risk Factor: High Attack Type: Network Based Brief Description: MERCUR Mailserver EXPN buffer overflow X-Force URL: http://xforce.iss.net/static/6149.php


Date Reported: 2/23/01 Vulnerability: sedum-http-dos Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP server denial of service X-Force URL: http://xforce.iss.net/static/6152.php


Date Reported: 2/23/01 Vulnerability: tru64-inetd-dos Platforms Affected: Tru64 Risk Factor: Medium Attack Type: Host Based Brief Description: Tru64 UNIX inetd denial of service X-Force URL: http://xforce.iss.net/static/6157.php


Date Reported: 2/22/01 Vulnerability: outlook-vcard-bo Platforms Affected: Microsoft Outlook Risk Factor: High Attack Type: Host Based Brief Description: Outlook and Outlook Express vCards buffer overflow X-Force URL: http://xforce.iss.net/static/6145.php


Date Reported: 2/22/01 Vulnerability: ultimatebb-cookie-member-number Platforms Affected: Ultimate Bulletin Board Risk Factor: High Attack Type: Network Based Brief Description: Ultimate Bulletin Board cookie allows attacker to change member number X-Force URL: http://xforce.iss.net/static/6144.php


Date Reported: 2/21/01 Vulnerability: ultimatebb-cookie-gain-privileges Platforms Affected: Ultimate Bulletin Board Risk Factor: Medium Attack Type: Network Based Brief Description: Ultimate Bulletin Board allows remote attacker to obtain cookie information X-Force URL: http://xforce.iss.net/static/6142.php


Date Reported: 2/21/01 Vulnerability: sendmail-elevate-privileges Platforms Affected: Sendmail Risk Factor: High Attack Type: Host Based Brief Description: Sendmail -bt command could allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6147.php


Date Reported: 2/21/01 Vulnerability: jre-jdk-execute-commands Platforms Affected: JRE/JDK Risk Factor: High Attack Type: Host Based Brief Description: JRE/JDK could allow unauthorized execution of commands X-Force URL: http://xforce.iss.net/static/6143.php


Date Reported: 2/20/01 Vulnerability: licq-remote-port-dos Platforms Affected: LICQ Risk Factor: Medium Attack Type: Network Based Brief Description: LICQ remote denial of service X-Force URL: http://xforce.iss.net/static/6134.php


Date Reported: 2/20/01 Vulnerability: pgp4pine-expired-keys Platforms Affected: pgp4pine Risk Factor: Medium Attack Type: Host Based Brief Description: pgp4pine may transmit messages using expired public keys X-Force URL: http://xforce.iss.net/static/6135.php


Date Reported: 2/20/01 Vulnerability: chilisoft-asp-view-files Platforms Affected: Chili!Soft ASP Risk Factor: High Attack Type: Network Based Brief Description: Chili!Soft ASP allows remote attackers to gain access to sensitive information X-Force URL: http://xforce.iss.net/static/6137.php


Date Reported: 2/20/01 Vulnerability: win2k-domain-controller-dos Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Network/Host Based Brief Description: Windows 2000 domain controller denial of service X-Force URL: http://xforce.iss.net/static/6136.php


Date Reported: 2/19/01 Vulnerability: asx-remote-dos Platforms Affected: ASX Switches Risk Factor: Medium Attack Type: Network Based Brief Description: ASX switches allow remote denial of service X-Force URL: http://xforce.iss.net/static/6133.php


Date Reported: 2/18/01 Vulnerability: http-cgi-mailnews-username Platforms Affected: Mailnews.cgi Risk Factor: High Attack Type: Network Based Brief Description: Mailnews.cgi allows remote attacker to execute shell commands using username X-Force URL: http://xforce.iss.net/static/6139.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-reveal-path Platforms Affected: BadBlue Risk Factor: Low Attack Type: Network Based Brief Description: BadBlue ext.dll library reveals path X-Force URL: http://xforce.iss.net/static/6130.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-dos Platforms Affected: BadBlue Risk Factor: Medium Attack Type: Network Based Brief Description: BadBlue ext.dll library denial of service X-Force URL: http://xforce.iss.net/static/6131.php


Date Reported: 2/17/01 Vulnerability: moby-netsuite-bo Platforms Affected: Moby's NetSuite Risk Factor: Medium Attack Type: Network Based Brief Description: Moby's NetSuite Web server buffer overflow X-Force URL: http://xforce.iss.net/static/6132.php


Date Reported: 2/16/01 Vulnerability: webactive-directory-traversal Platforms Affected: WEBactive Risk Factor: Medium Attack Type: Network/Host Based Brief Description: WEBactive HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6121.php


Date Reported: 2/16/01 Vulnerability: esone-cgi-directory-traversal Platforms Affected: ES.One store.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Thinking Arts ES.One store.cgi directory traversal X-Force URL: http://xforce.iss.net/static/6124.php


Date Reported: 2/16/01 Vulnerability: vshell-username-bo Platforms Affected: VShell Risk Factor: High Attack Type: Network Based Brief Description: VShell username buffer overflow X-Force URL: http://xforce.iss.net/static/6146.php


Date Reported: 2/16/01 Vulnerability: vshell-port-forwarding-rule Platforms Affected: VShell Risk Factor: Medium Attack Type: Network/Host Based Brief Description: VShell uses weak port forwarding rule X-Force URL: http://xforce.iss.net/static/6148.php


Date Reported: 2/15/01 Vulnerability: pi3web-isapi-bo Platforms Affected: Pi3Web Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Pi3Web ISAPI tstisapi.dll denial of service X-Force URL: http://xforce.iss.net/static/6113.php


Date Reported: 2/15/01 Vulnerability: pi3web-reveal-path Platforms Affected: Pi3Web Risk Factor: Low Attack Type: Network Based Brief Description: Pi3Web reveals physical path of server X-Force URL: http://xforce.iss.net/static/6114.php


Date Reported: 2/15/01 Vulnerability: bajie-execute-shell Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer execute shell commands X-Force URL: http://xforce.iss.net/static/6117.php


Date Reported: 2/15/01 Vulnerability: bajie-directory-traversal Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer directory traversal X-Force URL: http://xforce.iss.net/static/6115.php


Date Reported: 2/15/01 Vulnerability: resin-directory-traversal Platforms Affected: Resin Risk Factor: Medium Attack Type: Network Based Brief Description: Resin Web server directory traversal X-Force URL: http://xforce.iss.net/static/6118.php


Date Reported: 2/15/01 Vulnerability: netware-mitm-recover-passwords Platforms Affected: Netware Risk Factor: Low Attack Type: Network Based Brief Description: Netware "man in the middle" attack password recovery X-Force URL: http://xforce.iss.net/static/6116.php


Date Reported: 2/14/01 Vulnerability: firebox-pptp-dos Platforms Affected: WatchGuard Firebox II Risk Factor: High Attack Type: Network Based Brief Description: WatchGuard Firebox II PPTP denial of service X-Force URL: http://xforce.iss.net/static/6109.php


Date Reported: 2/14/01 Vulnerability: hp-virtualvault-iws-dos Platforms Affected: HP VirtualVault Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HP VirtualVault iPlanet Web Server denial of service X-Force URL: http://xforce.iss.net/static/6110.php


Date Reported: 2/14/01 Vulnerability: kicq-execute-commands Platforms Affected: KICQ Risk Factor: High Attack Type: Network Based Brief Description: kicq could allow remote execution of commands X-Force URL: http://xforce.iss.net/static/6112.php


Date Reported: 2/14/01 Vulnerability: hp-text-editor-bo Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP Text editors buffer overflow X-Force URL: http://xforce.iss.net/static/6111.php


Date Reported: 2/13/01 Vulnerability: sendtemp-pl-read-files Platforms Affected: sendtemp.pl Risk Factor: Medium Attack Type: Network/Host Based Brief Description: sendtemp.pl could allow an attacker to read files on the server X-Force URL: http://xforce.iss.net/static/6104.php


Date Reported: 2/13/01 Vulnerability: analog-alias-bo Platforms Affected: Analog ALIAS Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Analog ALIAS command buffer overflow X-Force URL: http://xforce.iss.net/static/6105.php


Date Reported: 2/13/01 Vulnerability: elm-long-string-bo Platforms Affected: Elm Risk Factor: Medium Attack Type: Host Based Brief Description: ELM -f command long string buffer overflow X-Force URL: http://xforce.iss.net/static/6151.php


Date Reported: 2/13/01 Vulnerability: winnt-pptp-dos Platforms Affected: Windows NT Risk Factor: Medium Attack Type: Network Based Brief Description: Windows NT PPTP denial of service X-Force URL: http://xforce.iss.net/static/6103.php


Date Reported: 2/12/01 Vulnerability: startinnfeed-format-string Platforms Affected: Inn Risk Factor: High Attack Type: Host Based Brief Description: Inn 'startinnfeed' binary format string attack X-Force URL: http://xforce.iss.net/static/6099.php


Date Reported: 2/12/01 Vulnerability: his-auktion-cgi-url Platforms Affected: HIS Auktion Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HIS Auktion CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6090.php


Date Reported: 2/12/01 Vulnerability: wayboard-cgi-view-files Platforms Affected: Way-BOARD Risk Factor: Medium Attack Type: Network Based Brief Description: Way-BOARD CGI could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6091.php


Date Reported: 2/12/01 Vulnerability: muskat-empower-url-dir Platforms Affected: Musket Empower Risk Factor: Low Attack Type: Network/Host Based Brief Description: Musket Empower could allow attackers to gain access to the DB directory path X-Force URL: http://xforce.iss.net/static/6093.php


Date Reported: 2/12/01 Vulnerability: icq-icu-rtf-dos Platforms Affected: LICQ Gnome ICU Risk Factor: Low Attack Type: Network/Host Based Brief Description: LICQ and Gnome ICU rtf file denial of service X-Force URL: http://xforce.iss.net/static/6096.php


Date Reported: 2/12/01 Vulnerability: commerce-cgi-view-files Platforms Affected: Commerce.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Commerce.cgi could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6095.php


Date Reported: 2/12/01 Vulnerability: roads-search-view-files Platforms Affected: ROADS Risk Factor: Medium Attack Type: Network Based Brief Description: ROADS could allow attackers to view unauthorized files using search.pl program X-Force URL: http://xforce.iss.net/static/6097.php


Date Reported: 2/12/01 Vulnerability: webpage-cgi-view-info Platforms Affected: WebPage.cgi Risk Factor: Low Attack Type: Network Based Brief Description: WebPage.cgi allows attackers to view sensitive information X-Force URL: http://xforce.iss.net/static/6100.php


Date Reported: 2/12/01 Vulnerability: webspirs-cgi-view-files Platforms Affected: WebSPIRS Risk Factor: Medium Attack Type: Network Based Brief Description: WebSPIRS CGI could allow an attacker to view unauthorized files X-Force URL: http://xforce.iss.net/static/6101.php


Date Reported: 2/12/01 Vulnerability: webpals-library-cgi-url Platforms Affected: WebPALS Risk Factor: Medium Attack Type: Network Based Brief Description: WebPALS Library System CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6102.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-permissions Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled with nolicense permissions X-Force URL: http://xforce.iss.net/static/6092.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-symlink Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled allows symlink in nolicense X-Force URL: http://xforce.iss.net/static/6094.php


Date Reported: 2/10/01 Vulnerability: vixie-crontab-bo Platforms Affected: Vixie crontab Risk Factor: Medium Attack Type: Host Based Brief Description: Vixie crontab buffer overflow X-Force URL: http://xforce.iss.net/static/6098.php


Date Reported: 2/10/01 Vulnerability: novell-groupwise-bypass-policies Platforms Affected: Novell GroupWise Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Novell Groupwise allows user to bypass policies and view files X-Force URL: http://xforce.iss.net/static/6089.php


Date Reported: 2/9/01 Vulnerability: infobot-calc-gain-access Platforms Affected: Infobot Risk Factor: High Attack Type: Network Based Brief Description: Infobot 'calc' command allows remote users to gain access X-Force URL: http://xforce.iss.net/static/6078.php


Date Reported: 2/8/01 Vulnerability: linux-sysctl-read-memory Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux kernel sysctl() read memory X-Force URL: http://xforce.iss.net/static/6079.php


Date Reported: 2/8/01 Vulnerability: openssh-bypass-authentication Platforms Affected: OpenSSH Risk Factor: High Attack Type: Network/Host Based Brief Description: OpenSSH 2.3.1 allows remote users to bypass authentication X-Force URL: http://xforce.iss.net/static/6084.php


Date Reported: 2/8/01 Vulnerability: lotus-notes-stored-forms Platforms Affected: Lotus Notes Risk Factor: High Attack Type: Network/Host Based Brief Description: Lotus Notes stored forms X-Force URL: http://xforce.iss.net/static/6087.php


Date Reported: 2/8/01 Vulnerability: linux-ptrace-modify-process Platforms Affected: Linux Risk Factor: High Attack Type: Host Based Brief Description: Linux kernel ptrace modify process X-Force URL: http://xforce.iss.net/static/6080.php


Date Reported: 2/8/01 Vulnerability: ssh-deattack-overwrite-memory Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 deattack.c allows memory to be overwritten X-Force URL: http://xforce.iss.net/static/6083.php


Date Reported: 2/7/01 Vulnerability: dc20ctrl-port-bo Platforms Affected: FreeBSD Risk Factor: Medium Attack Type: Host Based Brief Description: FreeBSD dc20ctrl port buffer overflow X-Force URL: http://xforce.iss.net/static/6077.php


Date Reported: 2/7/01 Vulnerability: ja-xklock-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: ja-xklock buffer overflow X-Force URL: http://xforce.iss.net/static/6073.php


Date Reported: 2/7/01 Vulnerability: ja-elvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ja-elvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6074.php


Date Reported: 2/7/01 Vulnerability: ko-helvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ko-helvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6075.php


Date Reported: 2/7/01 Vulnerability: serverworx-directory-traversal Platforms Affected: ServerWorx Risk Factor: Medium Attack Type: Network Based Brief Description: ServerWorx directory traversal X-Force URL: http://xforce.iss.net/static/6081.php


Date Reported: 2/7/01 Vulnerability: ntlm-ssp-elevate-privileges Platforms Affected: NTLM Risk Factor: High Attack Type: Host Based Brief Description: NTLM Security Support Provider could allow elevation of privileges X-Force URL: http://xforce.iss.net/static/6076.php


Date Reported: 2/7/01 Vulnerability: ssh-session-key-recovery Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 session key recovery X-Force URL: http://xforce.iss.net/static/6082.php


Date Reported: 2/6/01 Vulnerability: aolserver-directory-traversal Platforms Affected: AOLserver Risk Factor: Medium Attack Type: Network Based Brief Description: AOLserver directory traversal X-Force URL: http://xforce.iss.net/static/6069.php


Date Reported: 2/6/01 Vulnerability: chilisoft-asp-elevate-privileges Platforms Affected: Chili!Soft Risk Factor: High Attack Type: Network/Host Based Brief Description: Chili!Soft ASP could allow elevated privileges X-Force URL: http://xforce.iss.net/static/6072.php


Date Reported: 2/6/01 Vulnerability: win-udp-dos Platforms Affected: Windows Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Windows UDP socket denial of service X-Force URL: http://xforce.iss.net/static/6070.php


Date Reported: 2/5/01 Vulnerability: ssh-daemon-failed-login Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH daemon failed login attempts are not logged X-Force URL: http://xforce.iss.net/static/6071.php


Date Reported: 2/5/01 Vulnerability: picserver-directory-traversal Platforms Affected: PicServer Risk Factor: Medium Attack Type: Network Based Brief Description: PicServer directory traversal X-Force URL: http://xforce.iss.net/static/6065.php


Date Reported: 2/5/01 Vulnerability: biblioweb-directory-traversal Platforms Affected: BiblioWeb Risk Factor: Medium Attack Type: Network Based Brief Description: BiblioWeb Server directory traversal X-Force URL: http://xforce.iss.net/static/6066.php


Date Reported: 2/5/01 Vulnerability: biblioweb-get-dos Platforms Affected: BiblioWeb Risk Factor: Low Attack Type: Network Based Brief Description: BiblioWeb Server GET request denial of service X-Force URL: http://xforce.iss.net/static/6068.php


Date Reported: 2/5/01 Vulnerability: ibm-netcommerce-reveal-information Platforms Affected: IBM Risk Factor: Medium Attack Type: Network/Host Based Brief Description: IBM Net.Commerce could reveal sensitive information X-Force URL: http://xforce.iss.net/static/6067.php


Date Reported: 2/5/01 Vulnerability: win-dde-elevate-privileges Platforms Affected: Windows DDE Risk Factor: High Attack Type: Host Based Brief Description: Windows DDE can allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6062.php


Date Reported: 2/4/01 Vulnerability: hsweb-directory-browsing Platforms Affected: HSWeb Risk Factor: Low Attack Type: Network Based Brief Description: HSWeb Web Server allows attacker to browse directories X-Force URL: http://xforce.iss.net/static/6061.php


Date Reported: 2/4/01 Vulnerability: sedum-directory-traversal Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6063.php


Date Reported: 2/4/01 Vulnerability: free-java-directory-traversal Platforms Affected: Free Java Risk Factor: Medium Attack Type: Network Based Brief Description: Free Java Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6064.php


Date Reported: 2/2/01 Vulnerability: goahead-directory-traversal Platforms Affected: GoAhead Risk Factor: High Attack Type: Network Based Brief Description: GoAhead Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6046.php


Date Reported: 2/2/01 Vulnerability: gnuserv-tcp-cookie-overflow Platforms Affected: Gnuserv Risk Factor: High Attack Type: Network/Host Based Brief Description: Gnuserv TCP enabled cookie buffer overflow X-Force URL: http://xforce.iss.net/static/6056.php


Date Reported: 2/2/01 Vulnerability: xmail-ctrlserver-bo Platforms Affected: Xmail CTRLServer Risk Factor: High Attack Type: Network Based Brief Description: XMail CTRLServer buffer overflow X-Force URL: http://xforce.iss.net/static/6060.php


Date Reported: 2/2/01 Vulnerability: netscape-webpublisher-acl-permissions Platforms Affected: Netscape Web Publisher Risk Factor: Medium Attack Type: Network Based Brief Description: Netcape Web Publisher poor ACL permissions X-Force URL: http://xforce.iss.net/static/6058.php


Date Reported: 2/1/01 Vulnerability: cups-httpgets-dos Platforms Affected: CUPS Risk Factor: High Attack Type: Host Based Brief Description: CUPS httpGets() function denial of service X-Force URL: http://xforce.iss.net/static/6043.php


Date Reported: 2/1/01 Vulnerability: prospero-get-pin Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero GET request reveals PIN information X-Force URL: http://xforce.iss.net/static/6044.php


Date Reported: 2/1/01 Vulnerability: prospero-weak-permissions Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero uses weak permissions X-Force URL: http://xforce.iss.net/static/6045.php


Risk Factor Key:

    High    Any vulnerability that provides an attacker with immediate
            access into a machine, gains superuser access, or bypasses
            a firewall.  Example:  A vulnerable Sendmail 8.6.5 version
            that allows an intruder to execute commands on mail
            server. 
    Medium  Any vulnerability that provides information that has a
            high potential of giving system access to an intruder. 
            Example: A misconfigured TFTP or vulnerable NIS server
            that allows an intruder to get the password file that
            could contain an account with a guessable password. 
    Low     Any vulnerability that provides information that
            potentially could lead to a compromise.  Example:  A
            finger that allows an intruder to find out who is online
            and potential accounts to attempt to crack passwords
            via brute force methods.

ISS is a leading global provider of security management solutions for e-business. By offering best-of-breed SAFEsuite(tm) security software, comprehensive ePatrol(tm) monitoring services and industry-leading expertise, ISS serves as its customers' trusted security provider protecting digital assets and ensuring the availability, confidentiality and integrity of computer systems and information critical to e-business success. ISS' security management solutions protect more than 5,000 customers including 21 of the 25 largest U.S. commercial banks, 9 of the 10 largest telecommunications companies and over 35 government agencies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe and Latin America. For more information, visit the ISS Web site at www.iss.net or call 800-776-2362.

Copyright (c) 2001 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv

iQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV 1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA h0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B tT+ylKw4hn4= =kfHg -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200106-0080",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 3.2,
        "vendor": "ssh security",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 2.4,
        "vendor": "openssh",
        "version": null
      },
      {
        "model": "catalyst csx",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "60005.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ex",
        "scope": null,
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openbsd",
        "version": "2.1"
      },
      {
        "model": "ssh",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openbsd",
        "version": "2.1.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openbsd",
        "version": "1.2.3"
      },
      {
        "model": "ios 12.2xq",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xh",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xe",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xd",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xa",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2t",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "ios 12.1yf",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yd",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yc",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yb",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xu",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xt",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xq",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xp",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xm",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xl",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xj",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xi",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xh",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xg",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xf",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xc",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xb",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1t",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ec",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1e",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0s",
        "scope": null,
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60006.2(0.110)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60006.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "60005.5"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "core sdi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "smoothwall",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "holger lamm",
        "version": null
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "openssh",
        "version": "2.1.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "openssh",
        "version": "2.1"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "openssh",
        "version": "1.2.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.3(1)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.2(5)"
      },
      {
        "model": "ios 12.1ya",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xy",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "12.1xv"
      },
      {
        "model": "ios 12.1xs",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xr",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xk",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xe",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xd",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xa",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ez",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ey",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ex",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1dc",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1db",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "webns b11s",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "webns 1b6s",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "webns 0b22s",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "webns 1b42s",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "6.0(1)"
      },
      {
        "model": "catalyst pan",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "60006.3"
      },
      {
        "model": "catalyst",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "60006.2(0.111)"
      },
      {
        "model": "catalyst",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "60006.1(2.13)"
      },
      {
        "model": "ssh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ssh",
        "version": "1.2.31"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.30"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.29"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.28"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.27"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.26"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.25"
      },
      {
        "model": "communications security ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "1.2.24"
      },
      {
        "model": "computing safeword agent for ssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "secure",
        "version": "1.0"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.2"
      },
      {
        "model": "openssh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "1.2.2"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "ios 12.10s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.4"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.3"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.2"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.1"
      },
      {
        "model": "communications security ssh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ssh",
        "version": "2.0"
      },
      {
        "model": "openssh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "openssh",
        "version": "2.3"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(2)"
      },
      {
        "model": "pix firewall",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(6)"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2(3)"
      },
      {
        "model": "ios 12.2 t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2(1.1)"
      },
      {
        "model": "ios 12.2 xq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xd1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ec3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ez1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yd2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yb4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xy6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv3"
      },
      {
        "model": "ios 12.1 xu1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xr2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xg5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xm4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xp4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "webns 0b17s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "webns 0b13s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "webns b19s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "webns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "webns 1b29s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "webns 1b23s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "webns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "webns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "webns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.2"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios 12.2yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ye",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0xv"
      },
      {
        "model": "ios 12.0xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0st",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "css11000 content services switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60007.1(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60007.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3(4)"
      },
      {
        "model": "catalyst pan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.3"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.2(0.111)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(2.13)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60006.1(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(4)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(3)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(13)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.5(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(4)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(3)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(2)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60005.4"
      },
      {
        "model": "lamm pgp4pine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "holger",
        "version": "1.75.6"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "2344"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.2.31",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovered by Michal Zalewski \u003clcamtuf@bos.bindview.com\u003e on Feb 8, 2001.",
    "sources": [
      {
        "db": "BID",
        "id": "2347"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2001-0361",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2001-0361",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#161576",
            "trust": 0.8,
            "value": "6.48"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#290140",
            "trust": 0.8,
            "value": "21.09"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#13877",
            "trust": 0.8,
            "value": "6.84"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#25309",
            "trust": 0.8,
            "value": "0.39"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#945216",
            "trust": 0.8,
            "value": "99.00"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#566640",
            "trust": 0.8,
            "value": "0.68"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#651994",
            "trust": 0.8,
            "value": "1.50"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#315308",
            "trust": 0.8,
            "value": "2.06"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200106-182",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a \"Bleichenbacher attack\" on PKCS#1 version 1.5. An implementation problem in at least one Secure Shell (SSH) product and a weakness in the PKCS#1_1.5 public key encryption standard allows attackers to recover plaintext of messages encrypted with SSH. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root.  SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications.  An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. \nThis would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer.  The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). \nAs a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker.  This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. \n**UPDATE**:\nThere have been reports suggesting that exploitation of this vulnerability may be widespread. \nSince early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet.  Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. \nNOTE: Cisco 11000 Content Service Switch family is  vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. \nSecure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. \n** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. The data encryption techniques described in RSA\u0027s PKCS #1 standard are used in many protocols which rely on, at least in part, the security provided by public-key cryptography systems. \nSeveral protocols which implement the digital enveloping method described in version 1.5 of the PKCS #1 standard are susceptible to an adaptive ciphertext attack which may allow the recovery of session keys, thus compromising the integrity of the data transmitting during that session. \nBy capturing and logging the packets transmitted between a client and a server, an opponent could make use of a captured encrypted session key to launch a Bleichenbacher attack together with a simple timing attack.  If the session key is successfully decrypted, the saved packets can easily be decrypted in a uniform manner. \nInteractive key establishment protocols, such as SSH or SSL, are generally significantly more susceptible to successful attacks. \nCisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption.  The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets.  As many of these devices are critical infrastructure components, more serious network outages may occur. \nCisco has released upgrades that will eliminate this vulnerability.  An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user.  As a result, the user could transmit data, meant to be encrypted, as plaintext. \nTO UNSUBSCRIBE: email \"unsubscribe alert\" in the body of your message to\nmajordomo@iss.net  Contact alert-owner@iss.net for help with any problems!\n---------------------------------------------------------------------------\n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nISS X-Force has received reports that some individuals were unable to \nverify the PGP signature on the Security Alert Summary distributed earlier \nin the week. Due to this issue, X-Force is re-distributing the Security \nAlert Summary. We apologize for any inconvience this may have caused. \n\nInternet Security Systems Security Alert Summary\nMarch 5, 2001\nVolume 6 Number 4\n\nX-Force Vulnerability and Threat Database: http://xforce.iss.net/ To\nreceive these Alert Summaries as well as other Alerts and Advisories,\nsubscribe to the Internet Security Systems Alert mailing list at:\nhttp://xforce.iss.net/maillists/index.php\n\nThis summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php\n_____\n\nContents\n\n90 Reported Vulnerabilities\n\nRisk Factor Key\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-dos\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6161.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-directory-traversal\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6162.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          webreflex-web-server-dos\nPlatforms Affected:     WebReflex\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebReflex Web server denial of service\nX-Force URL:            http://xforce.iss.net/static/6163.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          sudo-bo-elevate-privileges\nPlatforms Affected:     Sudo\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Sudo buffer overflow could allow elevated user privileges\nX-Force URL:            http://xforce.iss.net/static/6153.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-skin-overwrite-file\nPlatforms Affected:     My GetRight\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      My GetRight \u0027skin\u0027 allows remote attacker to overwrite existing files\nX-Force URL:            http://xforce.iss.net/static/6155.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-directory-traversal\nPlatforms Affected:     My GetRight\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      My GetRight directory traversal\nX-Force URL:            http://xforce.iss.net/static/6156.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          win2k-event-viewer-bo\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Host Based\nBrief Description:      Windows 2000 event viewer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6160.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-cpu-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra CPU denial of service\nX-Force URL:            http://xforce.iss.net/static/6159.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-kernel-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra Server kernel denial of service\nX-Force URL:            http://xforce.iss.net/static/6158.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          mercur-expn-bo\nPlatforms Affected:     MERCUR\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      MERCUR Mailserver EXPN buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6149.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          sedum-http-dos\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP server denial of service\nX-Force URL:            http://xforce.iss.net/static/6152.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          tru64-inetd-dos\nPlatforms Affected:     Tru64\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Tru64 UNIX inetd denial of service\nX-Force URL:            http://xforce.iss.net/static/6157.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          outlook-vcard-bo\nPlatforms Affected:     Microsoft Outlook\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Outlook and Outlook Express vCards buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6145.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          ultimatebb-cookie-member-number\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board cookie allows attacker to change member number\nX-Force URL:            http://xforce.iss.net/static/6144.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          ultimatebb-cookie-gain-privileges\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board allows remote attacker to obtain cookie information\nX-Force URL:            http://xforce.iss.net/static/6142.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          sendmail-elevate-privileges\nPlatforms Affected:     Sendmail\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Sendmail -bt command could allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6147.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          jre-jdk-execute-commands\nPlatforms Affected:     JRE/JDK\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      JRE/JDK could allow unauthorized execution of commands\nX-Force URL:            http://xforce.iss.net/static/6143.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          licq-remote-port-dos\nPlatforms Affected:     LICQ\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      LICQ remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6134.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          pgp4pine-expired-keys\nPlatforms Affected:     pgp4pine\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      pgp4pine may transmit messages using expired public keys\nX-Force URL:            http://xforce.iss.net/static/6135.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          chilisoft-asp-view-files\nPlatforms Affected:     Chili!Soft ASP\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Chili!Soft ASP allows remote attackers to gain access to sensitive information\nX-Force URL:            http://xforce.iss.net/static/6137.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          win2k-domain-controller-dos\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Network/Host Based\nBrief Description:      Windows 2000 domain controller denial of service\nX-Force URL:            http://xforce.iss.net/static/6136.php\n\n_____\n\nDate Reported:          2/19/01\nVulnerability:          asx-remote-dos\nPlatforms Affected:     ASX Switches\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ASX switches allow remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6133.php\n\n_____\n\nDate Reported:          2/18/01\nVulnerability:          http-cgi-mailnews-username\nPlatforms Affected:     Mailnews.cgi\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Mailnews.cgi allows remote attacker to execute shell commands using username\nX-Force URL:            http://xforce.iss.net/static/6139.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-reveal-path\nPlatforms Affected:     BadBlue\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library reveals path\nX-Force URL:            http://xforce.iss.net/static/6130.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-dos\nPlatforms Affected:     BadBlue\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library denial of service\nX-Force URL:            http://xforce.iss.net/static/6131.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          moby-netsuite-bo\nPlatforms Affected:     Moby\u0027s NetSuite\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Moby\u0027s NetSuite Web server buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6132.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          webactive-directory-traversal\nPlatforms Affected:     WEBactive\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      WEBactive HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6121.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          esone-cgi-directory-traversal\nPlatforms Affected:     ES.One store.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Thinking Arts ES.One store.cgi directory traversal\nX-Force URL:            http://xforce.iss.net/static/6124.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-username-bo\nPlatforms Affected:     VShell\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      VShell username buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6146.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-port-forwarding-rule\nPlatforms Affected:     VShell\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      VShell uses weak port forwarding rule\nX-Force URL:            http://xforce.iss.net/static/6148.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-isapi-bo\nPlatforms Affected:     Pi3Web\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Pi3Web ISAPI tstisapi.dll denial of service\nX-Force URL:            http://xforce.iss.net/static/6113.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-reveal-path\nPlatforms Affected:     Pi3Web\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Pi3Web reveals physical path of server\nX-Force URL:            http://xforce.iss.net/static/6114.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-execute-shell\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer execute shell commands\nX-Force URL:            http://xforce.iss.net/static/6117.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-directory-traversal\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6115.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          resin-directory-traversal\nPlatforms Affected:     Resin\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Resin Web server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6118.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          netware-mitm-recover-passwords\nPlatforms Affected:     Netware\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Netware \"man in the middle\" attack password recovery\nX-Force URL:            http://xforce.iss.net/static/6116.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          firebox-pptp-dos\nPlatforms Affected:     WatchGuard Firebox II\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      WatchGuard Firebox II PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6109.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-virtualvault-iws-dos\nPlatforms Affected:     HP VirtualVault\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HP VirtualVault iPlanet Web Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6110.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          kicq-execute-commands\nPlatforms Affected:     KICQ\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      kicq could allow remote execution of commands\nX-Force URL:            http://xforce.iss.net/static/6112.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-text-editor-bo\nPlatforms Affected:     HPUX\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      HP Text editors buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6111.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          sendtemp-pl-read-files\nPlatforms Affected:     sendtemp.pl\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      sendtemp.pl could allow an attacker to read files on the server\nX-Force URL:            http://xforce.iss.net/static/6104.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          analog-alias-bo\nPlatforms Affected:     Analog ALIAS\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Analog ALIAS command buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6105.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          elm-long-string-bo\nPlatforms Affected:     Elm\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      ELM -f command long string buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6151.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          winnt-pptp-dos\nPlatforms Affected:     Windows NT\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Windows NT PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6103.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          startinnfeed-format-string\nPlatforms Affected:     Inn\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Inn \u0027startinnfeed\u0027 binary format string attack\nX-Force URL:            http://xforce.iss.net/static/6099.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          his-auktion-cgi-url\nPlatforms Affected:     HIS Auktion\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HIS Auktion CGI script could allow attackers to view unauthorized \n                        files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6090.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          wayboard-cgi-view-files\nPlatforms Affected:     Way-BOARD\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Way-BOARD CGI could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6091.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          muskat-empower-url-dir\nPlatforms Affected:     Musket Empower\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      Musket Empower could allow attackers to gain access to the DB directory path\nX-Force URL:            http://xforce.iss.net/static/6093.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          icq-icu-rtf-dos\nPlatforms Affected:     LICQ\n                        Gnome ICU\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      LICQ and Gnome ICU rtf file denial of service\nX-Force URL:            http://xforce.iss.net/static/6096.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          commerce-cgi-view-files\nPlatforms Affected:     Commerce.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Commerce.cgi could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6095.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          roads-search-view-files\nPlatforms Affected:     ROADS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ROADS could allow attackers to view unauthorized files using search.pl program\nX-Force URL:            http://xforce.iss.net/static/6097.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpage-cgi-view-info\nPlatforms Affected:     WebPage.cgi\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      WebPage.cgi allows attackers to view sensitive information\nX-Force URL:            http://xforce.iss.net/static/6100.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webspirs-cgi-view-files\nPlatforms Affected:     WebSPIRS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebSPIRS CGI could allow an attacker to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6101.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpals-library-cgi-url\nPlatforms Affected:     WebPALS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebPALS Library System CGI script could allow attackers to view \n                        unauthorized files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6102.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-permissions\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled with nolicense permissions\nX-Force URL:            http://xforce.iss.net/static/6092.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-symlink\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled allows symlink in nolicense\nX-Force URL:            http://xforce.iss.net/static/6094.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          vixie-crontab-bo\nPlatforms Affected:     Vixie crontab\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Vixie crontab buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6098.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          novell-groupwise-bypass-policies\nPlatforms Affected:     Novell GroupWise\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Novell Groupwise allows user to bypass policies and view files\nX-Force URL:            http://xforce.iss.net/static/6089.php\n\n_____\n\nDate Reported:          2/9/01\nVulnerability:          infobot-calc-gain-access\nPlatforms Affected:     Infobot\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Infobot \u0027calc\u0027 command allows remote users to gain access\nX-Force URL:            http://xforce.iss.net/static/6078.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-sysctl-read-memory\nPlatforms Affected:     Linux\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Linux kernel sysctl() read memory\nX-Force URL:            http://xforce.iss.net/static/6079.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          openssh-bypass-authentication\nPlatforms Affected:     OpenSSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      OpenSSH 2.3.1 allows remote users to bypass authentication\nX-Force URL:            http://xforce.iss.net/static/6084.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          lotus-notes-stored-forms\nPlatforms Affected:     Lotus Notes\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Lotus Notes stored forms\nX-Force URL:            http://xforce.iss.net/static/6087.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-ptrace-modify-process\nPlatforms Affected:     Linux\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Linux kernel ptrace modify process\nX-Force URL:            http://xforce.iss.net/static/6080.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          ssh-deattack-overwrite-memory\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 deattack.c allows memory to be overwritten\nX-Force URL:            http://xforce.iss.net/static/6083.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          dc20ctrl-port-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      FreeBSD dc20ctrl port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6077.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-xklock-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      ja-xklock buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6073.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-elvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ja-elvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6074.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ko-helvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ko-helvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6075.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          serverworx-directory-traversal\nPlatforms Affected:     ServerWorx\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ServerWorx directory traversal\nX-Force URL:            http://xforce.iss.net/static/6081.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ntlm-ssp-elevate-privileges\nPlatforms Affected:     NTLM\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      NTLM Security Support Provider could allow elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6076.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ssh-session-key-recovery\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 session key recovery\nX-Force URL:            http://xforce.iss.net/static/6082.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          aolserver-directory-traversal\nPlatforms Affected:     AOLserver\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      AOLserver directory traversal\nX-Force URL:            http://xforce.iss.net/static/6069.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          chilisoft-asp-elevate-privileges\nPlatforms Affected:     Chili!Soft\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Chili!Soft ASP could allow elevated privileges\nX-Force URL:            http://xforce.iss.net/static/6072.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          win-udp-dos\nPlatforms Affected:     Windows\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Windows UDP socket denial of service\nX-Force URL:            http://xforce.iss.net/static/6070.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ssh-daemon-failed-login\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH daemon failed login attempts are not logged\nX-Force URL:            http://xforce.iss.net/static/6071.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          picserver-directory-traversal\nPlatforms Affected:     PicServer\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      PicServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6065.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-directory-traversal\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6066.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-get-dos\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server GET request denial of service\nX-Force URL:            http://xforce.iss.net/static/6068.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ibm-netcommerce-reveal-information\nPlatforms Affected:     IBM\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      IBM Net.Commerce could reveal sensitive information\nX-Force URL:            http://xforce.iss.net/static/6067.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          win-dde-elevate-privileges\nPlatforms Affected:     Windows DDE\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Windows DDE can allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6062.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          hsweb-directory-browsing\nPlatforms Affected:     HSWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      HSWeb Web Server allows attacker to browse directories\nX-Force URL:            http://xforce.iss.net/static/6061.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          sedum-directory-traversal\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6063.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          free-java-directory-traversal\nPlatforms Affected:     Free Java\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Free Java Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6064.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          goahead-directory-traversal\nPlatforms Affected:     GoAhead\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      GoAhead Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6046.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          gnuserv-tcp-cookie-overflow\nPlatforms Affected:     Gnuserv\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Gnuserv TCP enabled cookie buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6056.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          xmail-ctrlserver-bo\nPlatforms Affected:     Xmail CTRLServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      XMail CTRLServer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6060.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          netscape-webpublisher-acl-permissions\nPlatforms Affected:     Netscape Web Publisher\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netcape Web Publisher poor ACL permissions\nX-Force URL:            http://xforce.iss.net/static/6058.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          cups-httpgets-dos\nPlatforms Affected:     CUPS\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      CUPS httpGets() function denial of service\nX-Force URL:            http://xforce.iss.net/static/6043.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-get-pin\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero GET request reveals PIN information\nX-Force URL:            http://xforce.iss.net/static/6044.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-weak-permissions\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero uses weak permissions\nX-Force URL:            http://xforce.iss.net/static/6045.php\n\n_____\n\nRisk Factor Key:\n\n        High    Any vulnerability that provides an attacker with immediate\n                access into a machine, gains superuser access, or bypasses\n                a firewall.  Example:  A vulnerable Sendmail 8.6.5 version\n                that allows an intruder to execute commands on mail\n                server. \n        Medium  Any vulnerability that provides information that has a\n                high potential of giving system access to an intruder. \n                Example: A misconfigured TFTP or vulnerable NIS server\n                that allows an intruder to get the password file that\n                could contain an account with a guessable password. \n        Low     Any vulnerability that provides information that\n                potentially could lead to a compromise.  Example:  A\n                finger that allows an intruder to find out who is online\n                and potential accounts to attempt to crack passwords\n                via brute force methods. \n\n________\n\n\nISS is a leading global provider of security management solutions for\ne-business. By offering best-of-breed SAFEsuite(tm) security software,\ncomprehensive ePatrol(tm) monitoring services and industry-leading\nexpertise, ISS serves as its customers\u0027 trusted security provider\nprotecting digital assets and ensuring the availability, confidentiality and\nintegrity of computer systems and information critical to e-business\nsuccess. ISS\u0027 security management solutions protect more than 5,000\ncustomers including 21 of the 25 largest U.S. commercial banks, 9 of the 10\nlargest telecommunications companies and over 35 government agencies. \nFounded in 1994, ISS is headquartered in Atlanta, GA, with additional\noffices throughout North America and international operations in Asia,\nAustralia, Europe and Latin America. For more information, visit the ISS Web\nsite at www.iss.net or call 800-776-2362. \n\nCopyright (c) 2001 by Internet Security Systems, Inc. \n\nPermission is hereby granted for the redistribution of this Alert\nelectronically.  It is not to be edited in any way without express consent\nof the X-Force.  If you wish to reprint the whole or any part of this Alert\nin any other medium excluding electronic medium, please e-mail\nxforce@iss.net for permission. \n\nDisclaimer\n\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There are\nNO warranties with regard to this information. In no event shall the author\nbe liable for any damages whatsoever arising out of or in connection with\nthe use or spread of this information. Any use of this information is at the\nuser\u0027s own risk. \n\n\n\nX-Force PGP Key available at: http://xforce.iss.net/sensitive.php as \nwell as on MIT\u0027s PGP key server and PGP.com\u0027s key server. \n\nPlease send suggestions, updates, and comments to: X-Force xforce@iss.net\nof Internet Security Systems, Inc. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: 2.6.3a\nCharset: noconv\n\niQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV\n1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA\nh0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B\ntT+ylKw4hn4=\n=kfHg\n-----END PGP SIGNATURE-----\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      },
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "2344"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      }
    ],
    "trust": 7.83
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#13877",
        "trust": 3.2
      },
      {
        "db": "BID",
        "id": "2344",
        "trust": 2.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216",
        "trust": 2.4
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309",
        "trust": 2.4
      },
      {
        "db": "OSVDB",
        "id": "2116",
        "trust": 1.6
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0361",
        "trust": 1.6
      },
      {
        "db": "BID",
        "id": "5114",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "2347",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "2405",
        "trust": 1.1
      },
      {
        "db": "XF",
        "id": "6083",
        "trust": 0.9
      },
      {
        "db": "XF",
        "id": "6135",
        "trust": 0.9
      },
      {
        "db": "XF",
        "id": "6063",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#161576",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "6449",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "2335",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "6472",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "6082",
        "trust": 0.7
      },
      {
        "db": "DEBIAN",
        "id": "DSA-027",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-023",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-086",
        "trust": 0.6
      },
      {
        "db": "SUSE",
        "id": "SUSE-SA:2001:04",
        "trust": 0.6
      },
      {
        "db": "FREEBSD",
        "id": "FREEBSD-SA-01:24",
        "trust": 0.6
      },
      {
        "db": "CIAC",
        "id": "L-047",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20010207 [CORE SDI ADVISORY] SSH1 SESSION KEY RECOVERY VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200106-182",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "6115",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6075",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6149",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6145",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6136",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6065",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6157",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6058",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6161",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6109",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6121",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6062",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6137",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6101",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6089",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6072",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6143",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6084",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6100",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6080",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6071",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6073",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6116",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6144",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6104",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6094",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6087",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6090",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6046",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6056",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6060",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6130",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6092",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6118",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6117",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6098",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6156",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6113",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6067",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6064",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6045",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6147",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6095",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6131",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6114",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6134",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6074",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6044",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6112",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6077",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6148",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6146",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6078",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6110",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6132",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6099",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6079",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6102",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6096",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6142",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6091",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6158",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6162",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6163",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6155",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6081",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6160",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6111",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6152",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6068",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6043",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6076",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6103",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6070",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6133",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6153",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6124",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6061",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6066",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6097",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6105",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6159",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6069",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6093",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6139",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "6151",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "24431",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "2344"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "id": "VAR-200106-0080",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.86113698
  },
  "last_update_date": "2024-07-23T19:26:39.063000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/2344"
      },
      {
        "trust": 2.4,
        "url": "http://www.kb.cert.org/vuls/id/13877"
      },
      {
        "trust": 2.4,
        "url": "http://www.ssh.com/products/ssh/cert/"
      },
      {
        "trust": 1.6,
        "url": "http://www.cert.org/advisories/ca-2001-35.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/945216"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/25309"
      },
      {
        "trust": 1.6,
        "url": "http://www.osvdb.org/2116"
      },
      {
        "trust": 1.6,
        "url": "http://www.novell.com/linux/security/advisories/adv004_ssh.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.debian.org/security/2001/dsa-086"
      },
      {
        "trust": 1.6,
        "url": "http://www.debian.org/security/2001/dsa-027"
      },
      {
        "trust": 1.6,
        "url": "http://www.debian.org/security/2001/dsa-023"
      },
      {
        "trust": 1.6,
        "url": "http://www.ciac.org/ciac/bulletins/l-047.shtml"
      },
      {
        "trust": 1.6,
        "url": "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-01:24.ssh.asc"
      },
      {
        "trust": 1.4,
        "url": "http://www.cisco.com/warp/public/707/ssh-multiple-pub.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.cisco.com/warp/public/707/ssh-scanning.shtml"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=98158450021686\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6082"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6083.php"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6135.php"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/static/6063.php"
      },
      {
        "trust": 0.8,
        "url": "http://securityportal.com/articles/magicnumbers20010227.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/5114"
      },
      {
        "trust": 0.8,
        "url": "http://www.corest.com/files/files/11/crc32.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www1.corest.com/common/showdoc.php?idx=131\u0026idxseccion=10"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/static/6449.php"
      },
      {
        "trust": 0.8,
        "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html"
      },
      {
        "trust": 0.8,
        "url": "http://www1.corest.com/common/showdoc.php?idx=81\u0026idxsection=10#"
      },
      {
        "trust": 0.8,
        "url": "http://www.openssh.com/security.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2347"
      },
      {
        "trust": 0.8,
        "url": "http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/alerts/advise100.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.cryptnet.net/fcp/audit/pgp4pine/01.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2405"
      },
      {
        "trust": 0.8,
        "url": "http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html"
      },
      {
        "trust": 0.8,
        "url": "http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html"
      },
      {
        "trust": 0.8,
        "url": "http://pgp4pine.flatline.de/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/2335"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/160452"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/static/6472.php"
      },
      {
        "trust": 0.7,
        "url": "http://xforce.iss.net/static/6082.php"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=98158450021686\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/support/alerts/11_06_02.html"
      },
      {
        "trust": 0.3,
        "url": "http://support.coresecurity.com/impact/exploits/56f46f9564b53fc1bca5bef469b60df7.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298289"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298274"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/298288"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6144.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6091.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6149.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6156.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6153.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6060.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6078.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6098.php"
      },
      {
        "trust": 0.1,
        "url": "https://www.iss.net"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6103.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6130.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6109.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6073.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6061.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6064.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6043.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6069.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6114.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6097.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6145.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6099.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6151.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6132.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6148.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6070.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6118.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6115.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6062.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6092.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6105.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6046.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6157.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6076.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6111.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6143.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6045.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6104.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6124.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6116.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6077.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6152.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6079.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6084.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6133.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6160.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6080.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6044.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6089.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6162.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6137.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6112.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6147.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6090.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6117.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6094.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6056.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6110.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/alerts/vol-6_num-4.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6074.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6155.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6058.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6102.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6121.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6139.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6146.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6081.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6095.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6071.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6159.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6134.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6100.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/maillists/index.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6101.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6096.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6066.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6113.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6093.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6065.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6087.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6068.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/sensitive.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6072.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6158.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6142.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6067.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6161.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6136.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6075.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6131.php"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/static/6163.php"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "2344"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "2344"
      },
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      },
      {
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-07-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "date": "2001-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "date": "2000-09-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "date": "2001-10-24T00:00:00",
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "date": "2001-07-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "date": "2001-05-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "date": "2001-01-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "BID",
        "id": "2347"
      },
      {
        "date": "2001-02-06T00:00:00",
        "db": "BID",
        "id": "2344"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "BID",
        "id": "5114"
      },
      {
        "date": "2001-02-20T00:00:00",
        "db": "BID",
        "id": "2405"
      },
      {
        "date": "2001-03-13T23:54:42",
        "db": "PACKETSTORM",
        "id": "24431"
      },
      {
        "date": "2001-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "date": "2001-06-27T04:00:00",
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-07-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#161576"
      },
      {
        "date": "2002-12-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#290140"
      },
      {
        "date": "2003-05-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#13877"
      },
      {
        "date": "2002-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#25309"
      },
      {
        "date": "2003-05-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#945216"
      },
      {
        "date": "2002-01-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#566640"
      },
      {
        "date": "2001-06-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#651994"
      },
      {
        "date": "2002-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#315308"
      },
      {
        "date": "2001-02-08T00:00:00",
        "db": "BID",
        "id": "2347"
      },
      {
        "date": "2001-02-06T00:00:00",
        "db": "BID",
        "id": "2344"
      },
      {
        "date": "2002-06-27T00:00:00",
        "db": "BID",
        "id": "5114"
      },
      {
        "date": "2001-02-20T00:00:00",
        "db": "BID",
        "id": "2405"
      },
      {
        "date": "2006-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200106-182"
      },
      {
        "date": "2018-05-03T01:29:11.913000",
        "db": "NVD",
        "id": "CVE-2001-0361"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "2347"
      },
      {
        "db": "BID",
        "id": "2344"
      },
      {
        "db": "BID",
        "id": "5114"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Certain implementations of SSH1 may reveal internal cryptologic state",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#161576"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Failure to Handle Exceptional Conditions",
    "sources": [
      {
        "db": "BID",
        "id": "5114"
      },
      {
        "db": "BID",
        "id": "2405"
      }
    ],
    "trust": 0.6
  }
}