![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10972 |
Category: | CISCO |
Title: | Multiple SSH vulnerabilities |
Summary: | NOSUMMARY |
Description: | Description: There are four vulnerabilities in the remote SSH daemon. By exploiting the weakness in the SSH protocol, it is possible to insert arbitrary commands into an established SSH session, collect information that may help in brute force key recovery, or brute force a session key. Solution : http://www.cisco.com/warp/public/707/SSH-multiple-pub.html Risk factor : High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2001-0572 Bugtraq: 20010318 Passive Analysis of SSH (Secure Shell) Traffic (Google Search) http://archives.neohapsis.com/archives/bugtraq/2001-03/0225.html CERT/CC vulnerability note: VU#596827 http://www.kb.cert.org/vuls/id/596827 Conectiva Linux advisory: CLA-2001:391 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000391 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3 http://www.redhat.com/support/errata/RHSA-2001-033.html |
Copyright | This script is (C) 2002 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |