Vulnerability Note VU#315308
Weak CRC allows last block of IDEA-encrypted SSH packet to be changed without notice
There is an information integrity vulnerability in the SSH1 protocol that allows the last block of an IDEA-encrypted session to be modified without notice.
Session is encrypted using IDEA cipher.
Compression is disabled.
SSH clients configured to use the IDEA cipher do so in cipher feedback (CFB) mode, in which each block of ciphertext is used to encrypt the next block. Because of this feedback, if any block of the ciphertext is modified, the remaining blocks will be garbled upon decryption. However, the last block of the SSH stream is not protected against modification, which means that it is possible to modify it using the properties of CRC checksumming described in VU#25309.
Note that this vulnerability can only be used on the last block of an SSH stream.
Attackers can modify the last block of an SSH packet encrypted with IDEA.
Disable the IDEA cipher with SSH1.
If you are a vendor and your product is affected, let
|Vendor||Status||Date Notified||Date Updated|
|SSH Communications Security||Affected||-||06 Feb 2001|
|OpenSSH||Not Affected||-||29 Oct 2001|
The CERT/CC thanks Antti Huima, Tuomas Aura, and Janne Salmi for their analysis and Tatu Ylonen for bringing this vulnerability to our attention.
This document was written by Jeffrey P. Lanza.
18 Jan 2001
Date First Published:
18 Jan 2001
Date Last Updated:
05 Mar 2002
If you have feedback, comments, or additional information about this vulnerability, please send us email.