CVE-2013-4548
Published: 8 November 2013
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.
Notes
Author | Note |
---|---|
mdeslaur | only affects openssh 6.2+ as that is when AES-GCM support was introduced |
Priority
Status
Package | Release | Status |
---|---|---|
openssh Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(1:5.3p1-3ubuntu7)
|
precise |
Not vulnerable
(1:5.9p1-5ubuntu1.1)
|
|
quantal |
Not vulnerable
(1:6.0p1-3ubuntu1)
|
|
raring |
Not vulnerable
(1:6.1p1-4)
|
|
saucy |
Released
(1:6.2p2-6ubuntu0.1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/monitor_wrap.c.diff?r1=1.76;r2=1.77 |