CVE-2013-4548

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00017.html - () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00017.html -
References () http://marc.info/?l=bugtraq&m=141576985122836&w=2 - () http://marc.info/?l=bugtraq&m=141576985122836&w=2 -
References () http://openwall.com/lists/oss-security/2013/11/08/3 - () http://openwall.com/lists/oss-security/2013/11/08/3 -
References () http://www.openssh.com/txt/gcmrekey.adv - Vendor Advisory () http://www.openssh.com/txt/gcmrekey.adv - Vendor Advisory
References () http://www.ubuntu.com/usn/USN-2014-1 - () http://www.ubuntu.com/usn/USN-2014-1 -

Information

Published : 2013-11-08 15:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4548

Mitre link : CVE-2013-4548

CVE.ORG link : CVE-2013-4548


JSON object : View

Products Affected

openbsd

  • openssh
CWE
CWE-264

Permissions, Privileges, and Access Controls