Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2653

Опубликовано: 27 мар. 2014
Источник: debian
EPSS Низкий

Описание

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:6.6p1-1package

EPSS

Процентиль: 82%
0.01872
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

redhat
больше 11 лет назад

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

nvd
больше 11 лет назад

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

github
больше 3 лет назад

The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

oracle-oval
больше 10 лет назад

ELSA-2015-0425: openssh security, bug fix and enhancement update (MODERATE)

EPSS

Процентиль: 82%
0.01872
Низкий