Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2014-0017

Overview

Vulnerability Score 1.9 1.9
CVE Id CVE-2014-0017
Last Modified 26 Mar 2014 12:55:45
Published 14 Mar 2014 11:55:05
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector LOCAL
Access Complexity MEDIUM
Authentication NONE

CVE-2014-0017

Summary

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Vulnerable Systems

Application

  • Libssh 0.4.7

  • Libssh 0.4.8

  • Libssh 0.5.0

  • Libssh 0.5.1

  • Libssh 0.5.2

  • Libssh 0.5.3

  • Libssh 0.5.4

  • Libssh 0.5.5

  • Libssh 0.6.0

  • Libssh 0.6.1

  • Libssh 0.6.2


References

CONFIRM - http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1072191

UBUNTU - USN-2145-1

MLIST - [oss-security] 20140305 libssh and stunnel PRNG flaws

SECUNIA - 57407

DEBIAN - DSA-2879

SUSE - openSUSE-SU-2014:0370

SUSE - openSUSE-SU-2014:0366


Last Updated: 27 May 2016 11:04:40