CVE-2001-1585
6.8
CVSS Score
Medium
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Link copied!
Description
SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.
CVSS Vector Details
Attack Vector
Network
Attack Complexity
M
Confidentiality
P
Integrity
P
Availability
P
Affected Software Configurations
- a openbsd openssh 2.3.1 * * * * * * *
Weaknesses (CWE)
- CWE-287
References & External Links
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html
- http://online.securityfocus.com/bid/2356
- http://www.openbsd.org/advisories/ssh_bypass.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6084
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html
- http://online.securityfocus.com/bid/2356
- http://www.openbsd.org/advisories/ssh_bypass.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6084
External Resources
CVE History Timeline
Oct 10, 2007 14:54
Initial Analysis
Jul 29, 2017 01:29
CVE Modified
May 14, 2024 01:20
CVE Modified
Nov 20, 2024 23:38
CVE Modified