[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2014:1552-02 -- Redhat openssh

ID: oval:org.secpod.oval:def:501419Date: (C)2014-10-27   (M)2024-02-19
Class: PATCHFamily: unix




OpenSSH is OpenBSD"s SSH protocol implementation. These packages include the core files necessary for both the OpenSSH client and server. It was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record. It was found that OpenSSH did not properly handle certain AcceptEnv parameter values with wildcard characters. A remote attacker could use this flaw to bypass intended environment variable restrictions. This update also fixes the following bugs: * Based on the SP800-131A information security standard, the generation of a digital signature using the Digital Signature Algorithm with the key size of 1024 bits and RSA with the key size of less than 2048 bits is disallowed after the year 2013. After this update, ssh-keygen no longer generates keys with less than 2048 bits in FIPS mode.

Platform:
Red Hat Enterprise Linux 6
Product:
openssh
Reference:
RHSA-2014:1552-02
CVE-2014-2532
CVE-2014-2653
CVE    2
CVE-2014-2532
CVE-2014-2653
CPE    9
cpe:/o:redhat:enterprise_linux:6
cpe:/a:openbsd:openssh:6.0
cpe:/a:openbsd:openssh:6.2
cpe:/a:openbsd:openssh:6.1
...

© SecPod Technologies