Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702894
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2894-1 (openssh - security update)
Summary:Two vulnerabilities were discovered in OpenSSH, an implementation of the;SSH protocol suite. The Common Vulnerabilities and Exposures project;identifies the following problems:;;CVE-2014-2532;Jann Horn discovered that OpenSSH incorrectly handled wildcards in;AcceptEnv lines. A remote attacker could use this issue to trick;OpenSSH into accepting any environment variable that contains the;characters before the wildcard character.;;CVE-2014-2653;Matthew Vernon reported that if a SSH server offers a;HostCertificate that the ssh client doesn't accept, then the client;doesn't check the DNS for SSHFP records. As a consequence a;malicious server can disable SSHFP-checking by presenting a;certificate.;;Note that a host verification prompt is still displayed before;connecting.
Description:Summary:
Two vulnerabilities were discovered in OpenSSH, an implementation of the
SSH protocol suite. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2014-2532
Jann Horn discovered that OpenSSH incorrectly handled wildcards in
AcceptEnv lines. A remote attacker could use this issue to trick
OpenSSH into accepting any environment variable that contains the
characters before the wildcard character.

CVE-2014-2653
Matthew Vernon reported that if a SSH server offers a
HostCertificate that the ssh client doesn't accept, then the client
doesn't check the DNS for SSHFP records. As a consequence a
malicious server can disable SSHFP-checking by presenting a
certificate.

Note that a host verification prompt is still displayed before
connecting.

Affected Software/OS:
openssh on Debian Linux

Solution:
For the oldstable distribution (squeeze), these problems have been fixed in
version 1:5.5p1-6+squeeze5.

For the stable distribution (wheezy), these problems have been fixed in
version 1:6.0p1-4+deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 1:6.6p1-1.

We recommend that you upgrade your openssh packages.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-2532
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
BugTraq ID: 66355
http://www.securityfocus.com/bid/66355
Debian Security Information: DSA-2894 (Google Search)
http://www.debian.org/security/2014/dsa-2894
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
HPdes Security Advisory: HPSBUX03188
http://marc.info/?l=bugtraq&m=141576985122836&w=2
HPdes Security Advisory: SSRT101487
http://www.mandriva.com/security/advisories?name=MDVSA-2014:068
http://www.mandriva.com/security/advisories?name=MDVSA-2015:095
http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
RedHat Security Advisories: RHSA-2014:1552
http://rhn.redhat.com/errata/RHSA-2014-1552.html
http://www.securitytracker.com/id/1029925
http://secunia.com/advisories/57488
http://secunia.com/advisories/57574
http://secunia.com/advisories/59313
http://secunia.com/advisories/59855
http://www.ubuntu.com/usn/USN-2155-1
XForce ISS Database: openssh-cve20142532-sec-bypass(91986)
https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
Common Vulnerability Exposure (CVE) ID: CVE-2014-2653
BugTraq ID: 66459
http://www.securityfocus.com/bid/66459
http://openwall.com/lists/oss-security/2014/03/26/7
RedHat Security Advisories: RHSA-2015:0425
http://rhn.redhat.com/errata/RHSA-2015-0425.html
http://www.ubuntu.com/usn/USN-2164-1
CopyrightCopyright (c) 2014 Greenbone Networks GmbH http://greenbone.net

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.