CVE-2001-1382

N/A Unknown
Published: September 27, 2001 Modified: April 16, 2026
View on NVD

Description

The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/Owl/CHANGES-stable.shtml
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/5408
Source: cve@mitre.org
http://www.openwall.com/Owl/CHANGES-stable.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/5408
Source: af854a3a-2127-422b-91ae-364da2661108

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.5%
81th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

openbsd