| Vulnerability Name: | CVE-2001-1382 (CCN-9803) | ||||||||
| Assigned: | 2001-09-27 | ||||||||
| Published: | 2001-09-27 | ||||||||
| Updated: | 2008-09-05 | ||||||||
| Summary: | The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used. | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||
| References: | Source: MITRE Type: CNA CVE-2001-1382 Source: CCN Type: OpenSSH Web site OpenSSH Source: CCN Type: Openwall Web site Owl: CHANGES (stable branch) Source: CONFIRM Type: Vendor Advisory http://www.openwall.com/Owl/CHANGES-stable.shtml Source: OSVDB Type: UNKNOWN 5408 Source: CCN Type: OSVDB ID: 5408 OpenSSH echo simulation Information Disclosure Source: XF Type: UNKNOWN openssh-echo-simulation-detection(9803) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||