Computer Security
[EN] securityvulns.ru no-pyccku


OpenSSH protection bypass
Published:08.04.2014
Source:
SecurityVulns ID:13678
Type:client
Threat Level:
6/10
Description:SSHFP protection bypass for client.
Affected:OPENSSH : OpenSSH 6.6
CVE:CVE-2014-2653 (The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.)
Original documentdocumentUBUNTU, [USN-2164-1] OpenSSH vulnerability (08.04.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod