CVE-2014-2653

EUVD-2014-2685
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
openbsdopenssh
𝑥
≤ 6.6
openbsdopenssh
6.0
openbsdopenssh
6.1
openbsdopenssh
6.2
openbsdopenssh
6.3
openbsdopenssh
6.4
openbsdopenssh
6.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssh
bookworm
1:9.2p1-2+deb12u3
fixed
bookworm (security)
1:9.2p1-2+deb12u3
fixed
bullseye
1:8.4p1-5+deb11u3
fixed
bullseye (security)
1:8.4p1-5+deb11u3
fixed
sid
1:9.9p1-3
fixed
trixie
1:9.9p1-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssh
lucid
not-affected
precise
Fixed 1:5.9p1-5ubuntu1.3
released
quantal
Fixed 1:6.0p1-3ubuntu1.2
released
saucy
Fixed 1:6.2p2-6ubuntu0.3
released
References