{"vuid":"VU#315308","idnumber":"315308","name":"Weak CRC allows last block of IDEA-encrypted SSH packet to be changed without notice","keywords":["IDEA","SSH packet","without notice","block cipher","cipher feedback mode","CFB"],"overview":"There is an information integrity vulnerability in the SSH1 protocol that allows the last block of an IDEA-encrypted session to be modified without notice.","clean_desc":"Preconditions: Session is encrypted using IDEA cipher. Compression is disabled. SSH clients configured to use the IDEA cipher do so in cipher feedback (CFB) mode, in which each block of ciphertext is used to encrypt the next block. Because of this feedback, if any block of the ciphertext is modified, the remaining blocks will be garbled upon decryption. However, the last block of the SSH stream is not protected against modification, which means that it is possible to modify it using the properties of CRC checksumming described in VU#25309. Note that this vulnerability can only be used on the last block of an SSH stream.","impact":"Attackers can modify the last block of an SSH packet encrypted with IDEA.","resolution":"","workarounds":"Disable the IDEA cipher with SSH1.","sysaffected":"","thanks":"The CERT/CC thanks Antti Huima, Tuomas Aura, and Janne Salmi for their analysis and Tatu Ylonen for bringing this vulnerability to our attention.","author":"This document was written by Jeffrey P. Lanza.","public":["http://www.ssh.com/products/ssh/cert/","http://www.kb.cert.org/vuls/id/25309","http://xforce.iss.net/static/6472.php"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-09-19T17:11:18Z","publicdate":"2001-01-18T00:00:00Z","datefirstpublished":"2001-01-18T18:50:05Z","dateupdated":"2002-03-05T20:23:19Z","revision":25,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"1","cam_internetinfrastructure":"5","cam_population":"14","cam_impact":"8","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"2.058","cam_scorecurrentwidelyknown":"7.644","cam_scorecurrentwidelyknownexploited":"13.23","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.058,"vulnote":null}