This document will summarize vulnerabilities in the ssh
cryptographic login program. These vulnerabilites enables a malicious user
to access a remote host without proper authorization. Numerous flaws have
been uncovered in the implementation of the SSH version 1 protocol.
The Problem
All versions of SSH and openSSH up to and including SSH-1.5-1.2.31 are
vulnerable to one or more exploits that can result in remote root
compromise. There are third party patches that correct most of these
exploits but not supported by the ssh vendors.
Resolutions
Vendors recommend upgrading to SSH version 2 protocol products. These exploits do not exist in the newer version 2. If this is not possible, upgrade to SSH-1.5-1.2.31 and apply the patches as defined in the references.