Overview
A vulnerability exists in SSH Secure Shell that allows an intruder to log to an account which contains a stored encrypted password of two or fewer characters in length. An intruder may leverage the privileges of such an account to gain full control of the system.
Description
Certain Unix and Linux systems ship with accounts containing two or fewer characters in the encrypted password field. For example, /etc/passwd or /etc/shadow might contain an entry similar to this: nobody:!!:11121:0:99999:7:::
Operating systems that do not use the crypt() hash function for password encryption are not vulnerable. |
Impact
Intruders can gain elevated privileges which they may leverage into root access. According to SSH Communications Security's advisory: |
Solution
SSH Communications Security recommends that customers upgrade to SSH Secure Shell 3.0.1 or later. |
Alternative solutions provided in SSH Communications Security 's advisory include the following:
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
The CERT Coordination thanks SSH Communications Security for information used in this document..
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2001-0553 |
Severity Metric: | 25.65 |
Date Public: | 2001-07-20 |
Date First Published: | 2001-07-24 |
Date Last Updated: | 2001-10-25 23:26 UTC |
Document Revision: | 43 |