CVE-2014-2653

NameCVE-2014-2653
DescriptionThe verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2894-1
NVD severitymedium (attack range: remote)
Debian Bugs742513

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssh (PTS)wheezy (security), wheezy1:6.0p1-4+deb7u4fixed
jessie (security), jessie1:6.7p1-5+deb8u2fixed
stretch, sid1:7.2p2-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensshsource(unstable)1:6.6p1-1low742513
opensshsourcesqueeze1:5.5p1-6+squeeze5mediumDSA-2894-1
opensshsourcewheezy1:6.0p1-4+deb7u1mediumDSA-2894-1

Search for package or bug name: Reporting problems