#VU45330 Permissions, Privileges, and Access Controls in OpenSSH - CVE-2011-0539
Published: February 10, 2011 / Updated: August 11, 2020
Vulnerability identifier: #VU45330
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2011-0539
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
OpenSSH
OpenSSH
Software vendor:
OpenSSH
OpenSSH
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
Remediation
Install update from vendor's website.
External links
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- http://secunia.com/advisories/43181
- http://secunia.com/advisories/44269
- http://www.openssh.com/txt/legacy-cert.adv
- http://www.openwall.com/lists/oss-security/2011/02/04/2
- http://www.securityfocus.com/bid/46155
- http://www.securitytracker.com/id?1025028
- http://www.vupen.com/english/advisories/2011/0284
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65163