CVE-2001-0553

N/A Unknown
Published: August 14, 2001 Modified: April 16, 2026
View on NVD

Description

SSH Secure Shell 3.0.0 on Unix systems does not properly perform password authentication to the sshd2 daemon, which allows local users to gain access to accounts with short password fields, such as locked accounts that use "NP" in the password field.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://archives.neohapsis.com/archives/bugtraq/2001-07/0486.html
Source: cve@mitre.org
Exploit Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/737451
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/586
Source: cve@mitre.org
http://archives.neohapsis.com/archives/bugtraq/2001-07/0486.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
http://www.ciac.org/ciac/bulletins/l-121.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/737451
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.osvdb.org/586
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/3078
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ssh.com/products/ssh/exploit.cfm
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/6868
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
57th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

ssh