Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-4548

Published: 8 November 2013

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

Notes

AuthorNote
mdeslaur
only affects openssh 6.2+ as that is when AES-GCM support was
introduced

Priority

High

Status

Package Release Status
openssh
Launchpad, Ubuntu, Debian
lucid Not vulnerable
(1:5.3p1-3ubuntu7)
precise Not vulnerable
(1:5.9p1-5ubuntu1.1)
quantal Not vulnerable
(1:6.0p1-3ubuntu1)
raring Not vulnerable
(1:6.1p1-4)
saucy
Released (1:6.2p2-6ubuntu0.1)
upstream Needs triage

Patches:
upstream: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/monitor_wrap.c.diff?r1=1.76;r2=1.77