Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1059052 - (CVE-2014-1692) CVE-2014-1692 openssh: uninitialized variable use in J-PAKE implementation
CVE-2014-1692 openssh: uninitialized variable use in J-PAKE implementation
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
impact=critical,public=20130129,repor...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2014-01-28 23:25 EST by Murray McAllister
Modified: 2015-01-04 17:38 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-01-29 11:35:45 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Murray McAllister 2014-01-28 23:25:05 EST
Mark Dowd reported uninitialized variable use in the shnorr_hash() function in OpenSSH. The J-PAKE implementation exposes this flaw. J-PAKE support is not enabled in the Red Hat Enterprise Linux and Fedora openssh packages.

Upstream fix:

http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c.diff?r1=1.9;r2=1.10
Comment 1 Murray McAllister 2014-01-28 23:30:15 EST
Possible CVE request: http://www.openwall.com/lists/oss-security/2014/01/29/2
Comment 2 Murray McAllister 2014-01-28 23:30:50 EST
J-PAKE support in OpenSSH is experimental work-in-progress.  It's not enabled in Red Hat Enterprise Linux and Fedora openssh packages.


Statement:

Not vulnerable. This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 4, 5, or 6, as the code for J-PAKE support is not compiled into the Red Hat shipped binaries.
Comment 3 Vincent Danen 2014-01-29 11:35:45 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-1692 to
the following vulnerability:

Name: CVE-2014-1692
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1692
Assigned: 20140129
Reference: http://openwall.com/lists/oss-security/2014/01/29/2
Reference: http://openwall.com/lists/oss-security/2014/01/29/10
Reference: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9;r2=1.10;f=h
Reference: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when
Makefile.inc is modified to enable the J-PAKE protocol, does not
initialize certain data structures, which might allow remote attackers
to cause a denial of service (memory corruption) or have unspecified
other impact via vectors that trigger an error condition.

Note You need to log in before you can comment on or make changes to this bug.