Bug 870532 (CVE-2014-2653) - VUL-1: CVE-2014-2653: openssh: failure to check DNS SSHFP records in certain scenarios
Summary: VUL-1: CVE-2014-2653: openssh: failure to check DNS SSHFP records in certain ...
Status: RESOLVED FIXED
Alias: CVE-2014-2653
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Petr Cerny
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/97366/
Whiteboard: maint:running:57015:low maint:releas...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-27 07:42 UTC by Marcus Meissner
Modified: 2019-01-31 13:32 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-03-27 07:42:18 UTC
via debian/redhat/oss-sec

Hi,

A vulnerability in OpenSSH's ssh client has been reported in Debian's BTS:
https://bugs.debian.org/742513

If the ssh server offers a HostCertificate that the ssh client doesn't accept, 
then the client doesn't then check the DNS for SSHFP records. This is a 
security problem because it means that a malicious server can disable SSHFP-
checking by presenting a certificate. Note that users are still presented the 
well-known "host verification prompt".

Given the prompt will and the still rather peripheral reliance on SSHFP, we 
consider this an issue of low severity.

Please assign a CVE name for this issue.

Thanks,

Thijs Kinkhorst
Debian Security Team


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1081338
Comment 1 Swamp Workflow Management 2014-03-27 23:00:17 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2014-06-02 14:23:05 UTC
sorry for forgetting this bug, but it should also be fixed now.
Comment 3 SMASH SMASH 2014-06-02 14:25:16 UTC
Affected packages:

SLE-11-SP3: openssh
SLE-10-SP3-TERADATA: openssh
Comment 5 Swamp Workflow Management 2014-06-18 21:48:51 UTC
Update released for: openssh, openssh-askpass, openssh-askpass-gnome, openssh-askpass-gnome-debuginfo, openssh-debuginfo, openssh-debugsource
Products:
SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLE-DESKTOP 11-SP3 (i386, x86_64)
SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLES4VMWARE 11-SP3 (i386, x86_64)
Comment 6 Swamp Workflow Management 2014-06-19 01:05:17 UTC
SUSE-SU-2014:0818-1: An update that solves one vulnerability and has four fixes is now available.

Category: security (low)
Bug References: 826427,833605,847710,869101,870532
CVE References: CVE-2014-2532
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1
SUSE Linux Enterprise Server 11 SP3 (src):    openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1
Comment 7 Marcus Meissner 2014-07-18 14:08:20 UTC
released