Bugzilla – Bug 870532
VUL-1: CVE-2014-2653: openssh: failure to check DNS SSHFP records in certain scenarios
Last modified: 2019-01-31 13:32:00 UTC
via debian/redhat/oss-sec Hi, A vulnerability in OpenSSH's ssh client has been reported in Debian's BTS: https://bugs.debian.org/742513 If the ssh server offers a HostCertificate that the ssh client doesn't accept, then the client doesn't then check the DNS for SSHFP records. This is a security problem because it means that a malicious server can disable SSHFP- checking by presenting a certificate. Note that users are still presented the well-known "host verification prompt". Given the prompt will and the still rather peripheral reliance on SSHFP, we consider this an issue of low severity. Please assign a CVE name for this issue. Thanks, Thijs Kinkhorst Debian Security Team References: https://bugzilla.redhat.com/show_bug.cgi?id=1081338
bugbot adjusting priority
sorry for forgetting this bug, but it should also be fixed now.
Affected packages: SLE-11-SP3: openssh SLE-10-SP3-TERADATA: openssh
Update released for: openssh, openssh-askpass, openssh-askpass-gnome, openssh-askpass-gnome-debuginfo, openssh-debuginfo, openssh-debugsource Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
SUSE-SU-2014:0818-1: An update that solves one vulnerability and has four fixes is now available. Category: security (low) Bug References: 826427,833605,847710,869101,870532 CVE References: CVE-2014-2532 Sources used: SUSE Linux Enterprise Server 11 SP3 for VMware (src): openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1 SUSE Linux Enterprise Server 11 SP3 (src): openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1 SUSE Linux Enterprise Desktop 11 SP3 (src): openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1
released