CVE-2014-8132
Mandriva Linux Security Advisory 2015-020
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
Vulnerabilidad de doble liberación en la función ssh_packet_kexinit en kex.c en libssh 0.5.x y 0.6.x anterior a 0.6.4 permite a atacantes remotos causar una denegación de servicio a través del paquete modificado kexinit.
When using libssh before 0.6.3, a libssh-based server, when accepting a new connection, forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC or DSA certificates may under certain conditions leak their private key. Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-10-10 CVE Reserved
- 2014-12-29 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2015-0014.html | Third Party Advisory | |
http://secunia.com/advisories/60838 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=1158089 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release | 2018-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.5.0 Search vendor "Libssh" for product "Libssh" and version "0.5.0" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.5.2 Search vendor "Libssh" for product "Libssh" and version "0.5.2" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.5.3 Search vendor "Libssh" for product "Libssh" and version "0.5.3" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.5.4 Search vendor "Libssh" for product "Libssh" and version "0.5.4" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.5.5 Search vendor "Libssh" for product "Libssh" and version "0.5.5" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.6.0 Search vendor "Libssh" for product "Libssh" and version "0.6.0" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.6.1 Search vendor "Libssh" for product "Libssh" and version "0.6.1" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.6.2 Search vendor "Libssh" for product "Libssh" and version "0.6.2" | - |
Affected
| ||||||
Libssh Search vendor "Libssh" | Libssh Search vendor "Libssh" for product "Libssh" | 0.6.3 Search vendor "Libssh" for product "Libssh" and version "0.6.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 12.3 Search vendor "Opensuse" for product "Opensuse" and version "12.3" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.1 Search vendor "Opensuse" for product "Opensuse" and version "13.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.2 Search vendor "Opensuse" for product "Opensuse" and version "13.2" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 19 Search vendor "Fedoraproject" for product "Fedora" and version "19" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 20 Search vendor "Fedoraproject" for product "Fedora" and version "20" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 21 Search vendor "Fedoraproject" for product "Fedora" and version "21" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.10" | - |
Affected
|