Vulnerability Details : CVE-2001-0144
CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.
Vulnerability category: Overflow
Threat overview for CVE-2001-0144
Top countries where our scanners detected CVE-2001-0144
Top open port discovered on systems with this issue
22
IPs affected by CVE-2001-0144 59
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2001-0144!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2001-0144
Probability of exploitation activity in the next 30 days: 12.25%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-0144
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2001-0144
-
http://razor.bindview.com/publish/advisories/adv_ssh1crc.html
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/2347
Exploit;Patch;Vendor Advisory
-
http://www.cert.org/advisories/CA-2001-35.html
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/6083
-
http://marc.info/?l=bugtraq&m=98168366406903&w=2
Products affected by CVE-2001-0144
- cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*