Unrated severityNVD Advisory· Published Aug 22, 2001· Updated Apr 16, 2026
CVE-2001-0572
CVE-2001-0572
Description
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
Affected products
9cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.linux-mandrake.com/en/security/2001/MDKSA-2001-033.php3nvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2001-033.htmlnvdPatchVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2001-03/0225.htmlnvdExploitPatchVendor Advisory
- distro.conectiva.com.br/atualizacoes/nvdVendor Advisory
- www.kb.cert.org/vuls/id/596827nvdUS Government Resource
News mentions
0No linked articles in our index yet.