Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-0539

Опубликовано: 10 фев. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

1:5.8p1-1ubuntu1
hardy

not-affected

karmic

not-affected

lucid

not-affected

maverick

not-affected

1:5.5p1-4ubuntu5
upstream

released

5.8p1

Показывать по

EPSS

Процентиль: 82%
0.01721
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

nvd
почти 15 лет назад

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

debian
почти 15 лет назад

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, ...

github
больше 3 лет назад

The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

EPSS

Процентиль: 82%
0.01721
Низкий

5 Medium

CVSS2