Executive Summary

Informations
Name CVE-2014-1692 First vendor Publication 2014-01-29
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1692

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:27946
 
Oval ID: oval:org.mitre.oval:def:27946
Title: HP-UX running HP Secure Shell, Remote Denial of Service (DoS) and other Vulnerabilities
Description: The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
Family: unix Class: vulnerability
Reference(s): CVE-2014-1692
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 130

Nessus® Vulnerability Scanner

Date Description
2014-07-24 Name : A clustered file system on the remote host is affected by a memory corruption...
File : ibm_gpfs_isg3T1020637_windows.nasl - Type : ACT_GATHER_INFO
2014-03-18 Name : The SSH server on the remote host is affected by multiple vulnerabilities.
File : openssh_66.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/65230
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637
HP http://marc.info/?l=bugtraq&m=141576985122836&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
MISC http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1...
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10
MLIST http://openwall.com/lists/oss-security/2014/01/29/10
http://openwall.com/lists/oss-security/2014/01/29/2
OSVDB http://osvdb.org/102611
SECUNIA http://secunia.com/advisories/60184
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/90819

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Date Informations
2024-02-02 01:26:38
  • Multiple Updates
2024-02-01 12:07:53
  • Multiple Updates
2023-09-05 12:25:13
  • Multiple Updates
2023-09-05 01:07:47
  • Multiple Updates
2023-09-02 12:25:11
  • Multiple Updates
2023-09-02 01:07:54
  • Multiple Updates
2023-08-12 12:27:28
  • Multiple Updates
2023-08-12 01:07:24
  • Multiple Updates
2023-08-11 12:23:20
  • Multiple Updates
2023-08-11 01:07:35
  • Multiple Updates
2023-08-06 12:22:41
  • Multiple Updates
2023-08-06 01:07:22
  • Multiple Updates
2023-08-04 12:22:44
  • Multiple Updates
2023-08-04 01:07:26
  • Multiple Updates
2023-07-14 12:22:42
  • Multiple Updates
2023-07-14 01:07:25
  • Multiple Updates
2023-03-29 01:24:36
  • Multiple Updates
2023-03-28 12:07:46
  • Multiple Updates
2023-02-13 05:28:24
  • Multiple Updates
2022-10-11 12:20:29
  • Multiple Updates
2022-10-11 01:07:34
  • Multiple Updates
2022-08-05 12:18:02
  • Multiple Updates
2021-05-04 12:32:12
  • Multiple Updates
2021-04-22 01:38:49
  • Multiple Updates
2020-07-25 12:10:11
  • Multiple Updates
2020-05-23 01:51:18
  • Multiple Updates
2020-05-23 00:40:05
  • Multiple Updates
2019-10-09 01:06:22
  • Multiple Updates
2017-08-29 09:24:28
  • Multiple Updates
2017-01-07 09:25:22
  • Multiple Updates
2016-08-23 09:24:50
  • Multiple Updates
2016-06-28 22:36:58
  • Multiple Updates
2016-04-27 00:17:04
  • Multiple Updates
2015-11-20 21:25:22
  • Multiple Updates
2014-12-03 09:26:50
  • Multiple Updates
2014-07-25 13:21:44
  • Multiple Updates
2014-02-07 13:21:48
  • Multiple Updates
2014-01-30 00:19:22
  • Multiple Updates
2014-01-29 21:22:37
  • First insertion