Matthew Vernon discovered that OpenSSH did not correctly check SSHFP DNS
records if a server presented an unacceptable host certificate. A malicious
server could use this issue to disable SSHFP checking.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.10 | noarch | openssh-client | < 1:6.2p2-6ubuntu0.3 | UNKNOWN |
Ubuntu | 13.10 | noarch | openssh-client-udeb | < 1:6.2p2-6ubuntu0.3 | UNKNOWN |
Ubuntu | 13.10 | noarch | openssh-server | < 1:6.2p2-6ubuntu0.3 | UNKNOWN |
Ubuntu | 13.10 | noarch | openssh-server-udeb | < 1:6.2p2-6ubuntu0.3 | UNKNOWN |
Ubuntu | 13.10 | noarch | ssh-askpass-gnome | < 1:6.2p2-6ubuntu0.3 | UNKNOWN |
Ubuntu | 12.10 | noarch | openssh-client | < 1:6.0p1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | openssh-client-udeb | < 1:6.0p1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | openssh-server | < 1:6.0p1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | openssh-server-udeb | < 1:6.0p1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | ssh-askpass-gnome | < 1:6.0p1-3ubuntu1.2 | UNKNOWN |