Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-2653


The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.


Published

2014-03-27T10:55:04.513

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openbsd openssh ≤ 6.6 Yes
Application openbsd openssh 6.0 Yes
Application openbsd openssh 6.1 Yes
Application openbsd openssh 6.2 Yes
Application openbsd openssh 6.3 Yes
Application openbsd openssh 6.4 Yes
Application openbsd openssh 6.5 Yes

References