7.5

CVE-2001-0572

Exploit

The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenbsdOpenssh Version4.5
SshSsh Version1.2.24
SshSsh Version1.2.25
SshSsh Version1.2.26
SshSsh Version1.2.27
SshSsh Version1.2.28
SshSsh Version1.2.29
SshSsh Version1.2.30
SshSsh Version1.2.31
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 24.51% 0.959
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P