CVE-2014-2653

NameCVE-2014-2653
DescriptionThe verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2894-1
NVD severitymedium (attack range: remote)
Debian Bugs742513
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssh (PTS)squeeze, squeeze (security)1:5.5p1-6+squeeze5fixed
wheezy1:6.0p1-4+deb7u2fixed
wheezy (security)1:6.0p1-4+deb7u1fixed
jessie1:6.7p1-5fixed
stretch, sid1:6.7p1-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensshsource(unstable)1:6.6p1-1low742513
opensshsourcesqueeze1:5.5p1-6+squeeze5mediumDSA-2894-1
opensshsourcewheezy1:6.0p1-4+deb7u1mediumDSA-2894-1

Search for package or bug name: Reporting problems