Executive Summary

Informations
Name CVE-2013-4548 First vendor Publication 2013-11-08
Vendor Cve Last vendor Modification 2019-10-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:P)
Cvss Base Score 6 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19115
 
Oval ID: oval:org.mitre.oval:def:19115
Title: USN-2014-1 -- openssh vulnerability
Description: OpenSSH could be made to run programs if it received specially crafted network traffic from an authenticated user.
Family: unix Class: patch
Reference(s): USN-2014-1
CVE-2013-4548
Version: 5
Platform(s): Ubuntu 13.10
Product(s): openssh
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22458
 
Oval ID: oval:org.mitre.oval:def:22458
Title: AIX OpenSSH Vulnerability
Description: The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
Family: unix Class: vulnerability
Reference(s): CVE-2013-4548
Version: 4
Platform(s): IBM AIX 5.3
IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28406
 
Oval ID: oval:org.mitre.oval:def:28406
Title: HP-UX running HP Secure Shell, Remote Denial of Service (DoS) and other Vulnerabilities
Description: The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
Family: unix Class: vulnerability
Reference(s): CVE-2013-4548
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-875.nasl - Type : ACT_GATHER_INFO
2014-04-02 Name : The remote AIX host is running a vulnerable version of OpenSSH.
File : aix_openssh_advisory3.nasl - Type : ACT_GATHER_INFO
2013-11-19 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2013-322-02.nasl - Type : ACT_GATHER_INFO
2013-11-13 Name : The SSH server on the remote host is affected by a memory corruption vulnerab...
File : openssh_gcm.nasl - Type : ACT_GATHER_INFO
2013-11-09 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2014-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://www.openssh.com/txt/gcmrekey.adv
HP http://marc.info/?l=bugtraq&m=141576985122836&w=2
MLIST http://openwall.com/lists/oss-security/2013/11/08/3
SUSE http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00017.html
UBUNTU http://www.ubuntu.com/usn/USN-2014-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2024-02-02 01:24:16
  • Multiple Updates
2024-02-01 12:07:14
  • Multiple Updates
2023-09-05 12:22:56
  • Multiple Updates
2023-09-05 01:07:09
  • Multiple Updates
2023-09-02 12:22:57
  • Multiple Updates
2023-09-02 01:07:14
  • Multiple Updates
2023-08-22 12:20:42
  • Multiple Updates
2022-10-11 01:06:55
  • Multiple Updates
2021-05-04 12:28:47
  • Multiple Updates
2021-04-22 01:34:55
  • Multiple Updates
2020-07-25 12:09:17
  • Multiple Updates
2020-05-23 00:38:05
  • Multiple Updates
2019-10-10 05:19:29
  • Multiple Updates
2016-04-26 23:34:27
  • Multiple Updates
2015-11-20 21:25:12
  • Multiple Updates
2014-12-03 09:26:41
  • Multiple Updates
2014-06-14 13:36:11
  • Multiple Updates
2014-04-03 13:22:35
  • Multiple Updates
2014-02-17 11:22:21
  • Multiple Updates
2013-12-01 13:19:14
  • Multiple Updates
2013-11-15 00:19:36
  • Multiple Updates
2013-11-09 00:21:37
  • Multiple Updates
2013-11-08 21:26:22
  • First insertion