Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.123284
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2014-1552)
Summary:The remote host is missing an update for the 'openssh' package(s) announced via the ELSA-2014-1552 advisory.
Description:Summary:
The remote host is missing an update for the 'openssh' package(s) announced via the ELSA-2014-1552 advisory.

Vulnerability Insight:
[5.3p1-104]
- ignore SIGXFSZ in postauth monitor child (#1133906)

[5.3p1-103]
- don't try to generate DSA keys in the init script in FIPS mode (#1118735)

[5.3p1-102]
- ignore SIGPIPE in ssh-keyscan (#1108836)

[5.3p1-101]
- ssh-add: fix fatal exit when removing card (#1042519)

[5.3p1-100]
- fix race in backported ControlPersist patch (#953088)

[5.3p1-99.2]
- skip requesting smartcard PIN when removing keys from agent (#1042519)

[5.3p1-98]
- add possibility to autocreate only RSA key into initscript (#1111568)
- fix several issues reported by coverity

[5.3p1-97]
- x11 forwarding - be less restrictive when can't bind to one of available addresses
(#1027197)
- better fork error detection in audit patch (#1028643)
- fix openssh-5.3p1-x11.patch for non-linux platforms (#1100913)

[5.3p1-96]
- prevent a server from skipping SSHFP lookup (#1081338) CVE-2014-2653
- ignore environment variables with embedded '=' or '\0' characters CVE-2014-2532
- backport ControlPersist option (#953088)
- log when a client requests an interactive session and only sftp is allowed (#997377)
- don't try to load RSA1 host key in FIPS mode (#1009959)
- restore Linux oom_adj setting when handling SIGHUP to maintain behaviour over restart
(#1010429)
- ssh-keygen -V - relative-specified certificate expiry time should be relative to current time
(#1022459)

[5.3p1-95]
- adjust the key echange DH groups and ssh-keygen according to SP800-131A (#993580)
- log failed integrity test if /etc/system-fips exists (#1020803)
- backport ECDSA and ECDH support (#1028335)

Affected Software/OS:
'openssh' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-2532
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
BugTraq ID: 66355
http://www.securityfocus.com/bid/66355
Debian Security Information: DSA-2894 (Google Search)
http://www.debian.org/security/2014/dsa-2894
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
HPdes Security Advisory: HPSBUX03188
http://marc.info/?l=bugtraq&m=141576985122836&w=2
HPdes Security Advisory: SSRT101487
http://www.mandriva.com/security/advisories?name=MDVSA-2014:068
http://www.mandriva.com/security/advisories?name=MDVSA-2015:095
http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
RedHat Security Advisories: RHSA-2014:1552
http://rhn.redhat.com/errata/RHSA-2014-1552.html
http://www.securitytracker.com/id/1029925
http://secunia.com/advisories/57488
http://secunia.com/advisories/57574
http://secunia.com/advisories/59313
http://secunia.com/advisories/59855
http://www.ubuntu.com/usn/USN-2155-1
XForce ISS Database: openssh-cve20142532-sec-bypass(91986)
https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
Common Vulnerability Exposure (CVE) ID: CVE-2014-2653
BugTraq ID: 66459
http://www.securityfocus.com/bid/66459
http://openwall.com/lists/oss-security/2014/03/26/7
RedHat Security Advisories: RHSA-2015:0425
http://rhn.redhat.com/errata/RHSA-2015-0425.html
http://www.ubuntu.com/usn/USN-2164-1
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.