
CVE-2001-1507
https://notcve.org/view.php?id=CVE-2001-1507
31 Dec 2001 — OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged. • http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/114.html •

CVE-2001-1585
https://notcve.org/view.php?id=CVE-2001-1585
31 Dec 2001 — SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html • CWE-287: Improper Authentication •

CVE-2001-0872
https://notcve.org/view.php?id=CVE-2001-0872
21 Dec 2001 — OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. OpenSSH 3.0.1 y anteriores con UseLogin activado no limpia variables de entorno críticas como LD_PRELOAD, lo que permite a usuario locales ganar privilegios de root. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-042.1.txt •

CVE-2001-0816
https://notcve.org/view.php?id=CVE-2001-0816
06 Dec 2001 — OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0153.html •

CVE-2001-1415
https://notcve.org/view.php?id=CVE-2001-1415
13 Nov 2001 — vi.recover in OpenBSD before 3.1 allows local users to remove arbitrary zero-byte files such as device nodes. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch •

CVE-2001-1380
https://notcve.org/view.php?id=CVE-2001-1380
18 Oct 2001 — OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431 •

CVE-2001-0670
https://notcve.org/view.php?id=CVE-2001-0670
03 Oct 2001 — Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-018.txt.asc •

CVE-2001-1382
https://notcve.org/view.php?id=CVE-2001-1382
27 Sep 2001 — The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used. • http://www.openwall.com/Owl/CHANGES-stable.shtml •

CVE-2001-1029 – FreeBSD 4.3/4.4 - Login Capabilities Privileged File Reading
https://notcve.org/view.php?id=CVE-2001-1029
20 Sep 2001 — libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files. • https://www.exploit-db.com/exploits/21114 •

CVE-2001-1145
https://notcve.org/view.php?id=CVE-2001-1145
17 Aug 2001 — fts routines in FreeBSD 4.3 and earlier, NetBSD before 1.5.2, and OpenBSD 2.9 and earlier can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform dangerous actions on the wrong directories. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:40.fts.v1.1.asc •