Bug 1059052 (CVE-2014-1692)

Summary: CVE-2014-1692 openssh: uninitialized variable use in J-PAKE implementation
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: jkurik, mattias.ellert, mgrepl, pfrields, plautrba, tmraz, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-01-29 16:35:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Murray McAllister 2014-01-29 04:25:05 UTC
Mark Dowd reported uninitialized variable use in the shnorr_hash() function in OpenSSH. The J-PAKE implementation exposes this flaw. J-PAKE support is not enabled in the Red Hat Enterprise Linux and Fedora openssh packages.

Upstream fix:

http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c.diff?r1=1.9;r2=1.10

Comment 1 Murray McAllister 2014-01-29 04:30:15 UTC
Possible CVE request: http://www.openwall.com/lists/oss-security/2014/01/29/2

Comment 2 Murray McAllister 2014-01-29 04:30:50 UTC
J-PAKE support in OpenSSH is experimental work-in-progress.  It's not enabled in Red Hat Enterprise Linux and Fedora openssh packages.


Statement:

Not vulnerable. This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 4, 5, or 6, as the code for J-PAKE support is not compiled into the Red Hat shipped binaries.

Comment 3 Vincent Danen 2014-01-29 16:35:45 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-1692 to
the following vulnerability:

Name: CVE-2014-1692
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1692
Assigned: 20140129
Reference: http://openwall.com/lists/oss-security/2014/01/29/2
Reference: http://openwall.com/lists/oss-security/2014/01/29/10
Reference: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9;r2=1.10;f=h
Reference: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when
Makefile.inc is modified to enable the J-PAKE protocol, does not
initialize certain data structures, which might allow remote attackers
to cause a denial of service (memory corruption) or have unspecified
other impact via vectors that trigger an error condition.