Executive Summary
Summary | |
---|---|
Title | libssh vulnerability |
Informations | |||
---|---|---|---|
Name | USN-2145-1 | First vendor Publication | 2014-03-12 |
Vendor | Ubuntu | Last vendor Modification | 2014-03-12 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 1.9 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: A security issue was fixed in libssh. Software Description: - libssh: A tiny C SSH library Details: Aris Adamantiadis discovered that libssh allowed the OpenSSL PRNG state to be reused when implementing forking servers. This could allow an attacker to possibly obtain information about the state of the PRNG and perform cryptographic attacks. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: Ubuntu 12.10: Ubuntu 12.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2145-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:23904 | |||
Oval ID: | oval:org.mitre.oval:def:23904 | ||
Title: | USN-2145-1 -- libssh vulnerability | ||
Description: | A security issue was fixed in libssh. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2145-1 CVE-2014-0017 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | libssh |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24236 | |||
Oval ID: | oval:org.mitre.oval:def:24236 | ||
Title: | DSA-2879-1 libssh - security update | ||
Description: | It was discovered that libssh, a tiny C SSH library, did not reset the state of the PRNG after accepting a connection. A server mode application that forks itself to handle incoming connections could see its children sharing the same PRNG state, resulting in a cryptographic weakness and possibly the recovery of the private key. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2879-1 CVE-2014-0017 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | libssh |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25490 | |||
Oval ID: | oval:org.mitre.oval:def:25490 | ||
Title: | SUSE-SU-2014:0413-1 -- Security update for libssh2 | ||
Description: | This update of libssh fixes the following security issue: * When libssh operates in server mode, the randomness pool was not switched on fork, so two pools could operate on the same randomness and could generate the same keys. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0413-1 CVE-2014-0017 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 11 | Product(s): | libssh2 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-04-22 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2015-111-04.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-086.nasl - Type : ACT_GATHER_INFO |
2014-10-30 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_f8c88d505fb311e481bd5453ed2e2b49.nasl - Type : ACT_GATHER_INFO |
2014-08-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201408-03.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-208.nasl - Type : ACT_GATHER_INFO |
2014-03-21 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_libssh2-140307.nasl - Type : ACT_GATHER_INFO |
2014-03-17 | Name : The remote Fedora host is missing a security update. File : fedora_2014-3485.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2879.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-053.nasl - Type : ACT_GATHER_INFO |
2014-03-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2145-1.nasl - Type : ACT_GATHER_INFO |
2014-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-3473.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-03-18 13:30:03 |
|
2014-03-14 13:21:34 |
|
2014-03-12 17:18:48 |
|