Overview
There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice.
Description
Preconditions: Attacker has a fragment of plaintext and its corresponding ciphertext. |
Impact
An attacker can modify arbitrary packets within an encrypted SSH session. |
Solution
Apply a patch from your vendor |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.cisco.com/warp/public/707/SSH-multiple-pub.html
- http://www.corest.com/files/files/11/CRC32.pdf
- http://www1.corest.com/common/showdoc.php?idx=131&idxseccion=10
- http://www.kb.cert.org/vuls/id/25309
- http://www.kb.cert.org/vuls/id/13877
- http://www.kb.cert.org/vuls/id/945216
- http://www.ssh.com/products/ssh/cert/
Acknowledgements
This vulnerability was first published by CORE-SDI on June 11, 1998.
This document was written by Jeffrey P. Lanza.
Other Information
CVE IDs: | CVE-1999-1085 |
Severity Metric: | 6.84 |
Date Public: | 1998-06-11 |
Date First Published: | 2001-11-07 |
Date Last Updated: | 2003-05-20 00:25 UTC |
Document Revision: | 20 |