CVE-2014-2653

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-2653
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-2653.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-2653
Downstream
Related
Published
2014-03-27T10:55:04Z
Modified
2025-04-12T10:46:40Z
Summary
[none]
Details

The verifyhostkey function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.

References

Affected packages

Debian:11 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:6.6p1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:6.6p1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:6.6p1-1

Ecosystem specific

{
    "urgency": "low"
}