GSD-2014-2653
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2014-2653",
"description": "The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.",
"id": "GSD-2014-2653",
"references": [
"https://www.suse.com/security/cve/CVE-2014-2653.html",
"https://www.debian.org/security/2014/dsa-2894",
"https://access.redhat.com/errata/RHSA-2015:0425",
"https://access.redhat.com/errata/RHSA-2014:1552",
"https://advisories.mageia.org/CVE-2014-2653.html",
"https://alas.aws.amazon.com/cve/html/CVE-2014-2653.html",
"https://linux.oracle.com/cve/CVE-2014-2653.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-2653"
],
"details": "The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.",
"id": "GSD-2014-2653",
"modified": "2023-12-13T01:22:46.319213Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2653",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-2164-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2164-1"
},
{
"name": "59855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59855"
},
{
"name": "RHSA-2015:0425",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0425.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0166.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0166.html"
},
{
"name": "HPSBUX03188",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2"
},
{
"name": "SSRT101487",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2"
},
{
"name": "66459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66459"
},
{
"name": "MDVSA-2015:095",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095"
},
{
"name": "[oss-security] 20140326 CVE request: openssh client does not check SSHFP if server offers certificate",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/03/26/7"
},
{
"name": "FEDORA-2014-6380",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"
},
{
"name": "DSA-2894",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2894"
},
{
"name": "RHSA-2014:1552",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html"
},
{
"name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
"refsource": "CONFIRM",
"url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513"
},
{
"name": "FEDORA-2014-6569",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"
},
{
"name": "MDVSA-2014:068",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.6",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2653"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513"
},
{
"name": "[oss-security] 20140326 CVE request: openssh client does not check SSHFP if server offers certificate",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2014/03/26/7"
},
{
"name": "USN-2164-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2164-1"
},
{
"name": "DSA-2894",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2014/dsa-2894"
},
{
"name": "FEDORA-2014-6380",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"
},
{
"name": "66459",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/66459"
},
{
"name": "FEDORA-2014-6569",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0166.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://advisories.mageia.org/MGASA-2014-0166.html"
},
{
"name": "MDVSA-2014:068",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"
},
{
"name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
"refsource": "CONFIRM",
"tags": [],
"url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"
},
{
"name": "RHSA-2014:1552",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html"
},
{
"name": "SSRT101487",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2"
},
{
"name": "RHSA-2015:0425",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0425.html"
},
{
"name": "MDVSA-2015:095",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name": "59855",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/59855"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-01-07T02:59Z",
"publishedDate": "2014-03-27T10:55Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…