5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
OpenSSH uses a weak authentication mechanism. It was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record.
advisories.mageia.org/MGASA-2014-0166.html
aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
marc.info/?l=bugtraq&m=141576985122836&w=2
openwall.com/lists/oss-security/2014/03/26/7
rhn.redhat.com/errata/RHSA-2014-1552.html
rhn.redhat.com/errata/RHSA-2015-0425.html
secunia.com/advisories/59855
www.debian.org/security/2014/dsa-2894
www.mandriva.com/security/advisories?name=MDVSA-2014:068
www.mandriva.com/security/advisories?name=MDVSA-2015:095
www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
www.securityfocus.com/bid/66459
www.ubuntu.com/usn/USN-2164-1
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/solutions/711953
bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513
bugzilla.redhat.com/show_bug.cgi?id=1010429
bugzilla.redhat.com/show_bug.cgi?id=1023043
bugzilla.redhat.com/show_bug.cgi?id=1023044
bugzilla.redhat.com/show_bug.cgi?id=1027197
bugzilla.redhat.com/show_bug.cgi?id=1028643
bugzilla.redhat.com/show_bug.cgi?id=1108836
bugzilla.redhat.com/show_bug.cgi?id=1111568
bugzilla.redhat.com/show_bug.cgi?id=953088
rhn.redhat.com/errata/RHSA-2014-1552.html