CVE-2014-1692

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
References
Link Resource
http://marc.info/?l=bugtraq&m=141576985122836&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141576985122836&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=144050155601375&w=2 Third Party Advisory
http://openwall.com/lists/oss-security/2014/01/29/10 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/01/29/2 Mailing List Third Party Advisory
http://osvdb.org/102611 Broken Link
http://secunia.com/advisories/60184 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637 Third Party Advisory
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10 Vendor Advisory
http://www.securityfocus.com/bid/65230 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90819 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=141576985122836&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141576985122836&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=144050155601375&w=2 Third Party Advisory
http://openwall.com/lists/oss-security/2014/01/29/10 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/01/29/2 Mailing List Third Party Advisory
http://osvdb.org/102611 Broken Link
http://secunia.com/advisories/60184 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637 Third Party Advisory
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10 Vendor Advisory
http://www.securityfocus.com/bid/65230 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90819 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=141576985122836&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=141576985122836&w=2 - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=144050155601375&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=144050155601375&w=2 - Third Party Advisory
References () http://openwall.com/lists/oss-security/2014/01/29/10 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2014/01/29/10 - Mailing List, Third Party Advisory
References () http://openwall.com/lists/oss-security/2014/01/29/2 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2014/01/29/2 - Mailing List, Third Party Advisory
References () http://osvdb.org/102611 - Broken Link () http://osvdb.org/102611 - Broken Link
References () http://secunia.com/advisories/60184 - Third Party Advisory () http://secunia.com/advisories/60184 - Third Party Advisory
References () http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637 - Third Party Advisory () http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637 - Third Party Advisory
References () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h - () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h -
References () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10 - Vendor Advisory () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10 - Vendor Advisory
References () http://www.securityfocus.com/bid/65230 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/65230 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/90819 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/90819 - Third Party Advisory, VDB Entry

Information

Published : 2014-01-29 16:02

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1692

Mitre link : CVE-2014-1692

CVE.ORG link : CVE-2014-1692


JSON object : View

Products Affected

openbsd

  • openssh
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer