First published: Tue Mar 04 2014(Updated: )
A flaw was found in libssh server. When accepting a new connection, the server forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC (ECDSA) or DSA certificates may under certain conditions leak their private key.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libssh | <=0.6.2 | |
libssh | =0.4.7 | |
libssh | =0.4.8 | |
libssh | =0.5.0 | |
libssh | =0.5.0-rc1 | |
libssh | =0.5.1 | |
libssh | =0.5.2 | |
libssh | =0.5.3 | |
libssh | =0.5.4 | |
libssh | =0.5.5 | |
libssh | =0.6.0 | |
libssh | =0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0017 has a medium severity, potentially impacting the security of systems using affected versions of libssh.
To fix CVE-2014-0017, update libssh to version 0.6.3 or later, as this version addresses the vulnerability.
CVE-2014-0017 affects libssh versions up to and including 0.6.2, as well as specific earlier versions.
CVE-2014-0017 involves the RAND_bytes() function not resetting its state after a fork, leading to potential security exposure.
As of the latest information, there are no confirmed reports of CVE-2014-0017 being exploited in the wild.