Vulnerability Note VU#13877
Weak CRC allows packet injection into SSH sessions encrypted with block ciphers
Overview
There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice.
Description
Preconditions: Attacker has a fragment of plaintext and its corresponding ciphertext. |
Impact
An attacker can modify arbitrary packets within an encrypted SSH session. |
Solution
Apply a patch from your vendor |
Systems Affected (Learn More)
| Vendor | Status | Date Notified | Date Updated |
|---|---|---|---|
| Cisco Systems Inc. | Affected | - | 27 Jun 2002 |
| OpenSSH | Affected | - | 06 Nov 2001 |
| SSH Communications Security | Affected | - | 06 Nov 2001 |
CVSS Metrics (Learn More)
| Group | Score | Vector |
|---|---|---|
| Base | N/A | N/A |
| Temporal | N/A | N/A |
| Environmental | N/A | N/A |
References
- VU#25309
- http://www.cisco.com/warp/public/707/SSH-multiple-pub.html
- http://www.corest.com/files/files/11/CRC32.pdf
- http://www1.corest.com/common/showdoc.php?idx=131&idxseccion=10
- http://www.kb.cert.org/vuls/id/25309
- http://www.kb.cert.org/vuls/id/13877
- http://www.kb.cert.org/vuls/id/945216
- http://www.ssh.com/products/ssh/cert/
Credit
This vulnerability was first published by CORE-SDI on June 11, 1998.
This document was written by Jeffrey P. Lanza.
Other Information
- CVE IDs: CVE-1999-1085
- Date Public: 11 Jun 98
- Date First Published: 06 Nov 2001
- Date Last Updated: 19 May 2003
- Severity Metric: 6.84
- Document Revision: 20
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.