First published: Tue Nov 18 2014(Updated: )
FreeBSD 9.1, 9.2, and 10.0, when compiling OpenSSH with Kerberos support, uses incorrect library ordering when linking sshd, which causes symbols to be resolved incorrectly and allows remote attackers to cause a denial of service (sshd deadlock and prevention of new connections) by ending multiple connections before authentication is completed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.2 | |
FreeBSD Kernel | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8475 has a severity rating that indicates a denial of service vulnerability impacting affected FreeBSD versions.
To fix CVE-2014-8475, upgrade to a patched version of FreeBSD that addresses the library ordering issue in OpenSSH.
CVE-2014-8475 affects FreeBSD versions 9.1, 9.2, and 10.0 when compiling OpenSSH with Kerberos support.
The potential impacts of CVE-2014-8475 include a denial of service that can cause sshd to deadlock and prevent new connections.
Remote attackers can exploit CVE-2014-8475 by sending multiple connections to the sshd service, leading to a deadlock.