The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2011/02/04/2 | mailing list |
http://www.securitytracker.com/id?1025028 | vdb entry |
http://www.securityfocus.com/bid/46155 | vdb entry |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 | |
http://www.vupen.com/english/advisories/2011/0284 | vdb entry vendor advisory |
http://secunia.com/advisories/43181 | third party advisory vendor advisory |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 | vendor advisory |
http://secunia.com/advisories/44269 | third party advisory |
http://www.openssh.com/txt/legacy-cert.adv | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65163 | vdb entry |