Ask the Community
Groups
CVE-2014-2653 openssh: failure to check DNS SSHFP records in certain scenarios - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2014-2653</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>It was discovered that OpenSSH clients did not correctly verify DNS SSHFP<br>records. A malicious server could use this flaw to force a connecting client<br>to skip the DNS SSHFP record check and require the user to perform manual host<br>verification of the DNS SSHFP record.<br><br>CVSS2 Base Score 4.3<br>Impact: Moderate <br><br><br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Resolution:<br>This was fixed in openssh-5.3p1-104.el6.x86_64 and later.<br>Apply Unitrends security update v10.29 from 07/27/2018 or later, containing openssh-5.3p1-123.el6_9.x86_64<br> </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2014-2653%250D%250Ahttp%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2014-2653">https://access.redhat.com/security/cve/cve-2014-2653 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2653</a></li></ul> </article> </main>