CVE-2014-2653

NameCVE-2014-2653
DescriptionThe verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2894-1
NVD severitymedium (attack range: remote)
Debian Bugs742513

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssh (PTS)wheezy (security), wheezy1:6.0p1-4+deb7u4fixed
jessie1:6.7p1-5+deb8u2fixed
jessie (security)1:6.7p1-5+deb8u3fixed
stretch1:7.2p2-5fixed
sid1:7.2p2-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensshsource(unstable)1:6.6p1-1low742513
opensshsourcesqueeze1:5.5p1-6+squeeze5mediumDSA-2894-1
opensshsourcewheezy1:6.0p1-4+deb7u1mediumDSA-2894-1

Search for package or bug name: Reporting problems