ID

VAR-201201-0316


CVE

CVE-2012-0814


TITLE

OpenSSH Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2012-001239

DESCRIPTION

The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory. The Debian openssh-server package is prone to an information-disclosure vulnerability. Successful exploits will allow attackers to gain access to sensitive information; this may lead to further attacks. Debian openssh-server 1:5.5p1-6+squeeze1 is affected; other versions may also be vulnerable. The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections (CVE-2010-5107). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0814 _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: d4dc59e94c2f0f4ca4ed3d29c05afd9d mes5/i586/openssh-5.1p1-2.3mdvmes5.2.i586.rpm 6bb053a5d82451594d433c0059c5f7a7 mes5/i586/openssh-askpass-5.1p1-2.3mdvmes5.2.i586.rpm cc26585ed65704d2fa6c0bcb102953c7 mes5/i586/openssh-askpass-common-5.1p1-2.3mdvmes5.2.i586.rpm 06ded6e5614c7a188a676550934e98bb mes5/i586/openssh-askpass-gnome-5.1p1-2.3mdvmes5.2.i586.rpm 860932e1a599ec68a150879b9c9abe52 mes5/i586/openssh-clients-5.1p1-2.3mdvmes5.2.i586.rpm fe26afea6473e680a45979a904bb7e3d mes5/i586/openssh-server-5.1p1-2.3mdvmes5.2.i586.rpm baa4beb7bfb76b7706166e7870ddd210 mes5/SRPMS/openssh-5.1p1-2.3mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 1c43725b46c279b7295c16e0fb9f43bf mes5/x86_64/openssh-5.1p1-2.3mdvmes5.2.x86_64.rpm d0231e13471148dfed86f75c4f99a2d0 mes5/x86_64/openssh-askpass-5.1p1-2.3mdvmes5.2.x86_64.rpm 2c06080b369ab13a9c95df47336aeb13 mes5/x86_64/openssh-askpass-common-5.1p1-2.3mdvmes5.2.x86_64.rpm 9fc99fb86e43c00139329787c7b3829d mes5/x86_64/openssh-askpass-gnome-5.1p1-2.3mdvmes5.2.x86_64.rpm 63621dfc8b9c4bf731711af418ea5c5f mes5/x86_64/openssh-clients-5.1p1-2.3mdvmes5.2.x86_64.rpm ea5653a3e6d790ce02f11fbcd722801d mes5/x86_64/openssh-server-5.1p1-2.3mdvmes5.2.x86_64.rpm baa4beb7bfb76b7706166e7870ddd210 mes5/SRPMS/openssh-5.1p1-2.3mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFRQFi+mqjQ0CJFipgRAuIuAJ9D6e15JXI7YDeAIZqQalKdXEmEWwCgjBoe quBwSmmMLE/orEkpMzGwKbQ= =PJAx -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ESA-2014-016: EMC VPLEX Multiple Vulnerabilities EMC Identifier: ESA-2014-016 CVE Identifier: See below for individual CVEs Severity Rating: CVSS v2 Base Score: See below for individual CVSS scores Affected products: All versions from VPLEX GeoSynchrony 4.0 through VPLEX GeoSynchrony 5.2.1 are affected Summary: EMC VPLEX GeoSynchrony 5.3 contains fixes for multiple vulnerabilities that could potentially be exploited by malicious users. Details: \x95Multiple Vulnerabilities affecting the VPLEX Web GUI. Please refer to the NVD website (http://web.nvd.nist.gov/) for more details on the below CVEs Path Traversal vulnerability in VPLEX GUI \x96 CVE-2014-0632 CVSS v2 Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C) VPLEX GUI Session Timeout validity vulnerability \x96 CVE-2014-0633 CVSS v2 Base Score: 7.7 (AV:A/AC:L/Au:S/C:C/I:C/A:C) Missing HttpOnly attribute vulnerability \x96 CVE-2014-0634 CVSS v2 Base Score: 6 (AV:N/AC:M/Au:S/C:P/I:P/A:P) Session Fixation vulnerability \x96 CVE-2014-0635 CVSS v2 Base Score: 7.5 (AV:N/AC:M/Au:S/C:C/I:P/A:P) BEAST Attack \x96 CVE-2011-3389 CVSS v2 Base Score: See NVD advisory for the CVSS score. \x95Multiple Embedded Component Vulnerabilities Multiple vulnerabilities in the following embedded components of the SLES Operating System have been fixed: Kernel: CVE-2011-1044, CVE-2011-4110, CVE-2012-2136 perl: CVE-2002-2443 krb5: CVE-2013-1667 bind packages: CVE-2012-5166 CVSS v2 Base Score: See NVD advisory for the individual CVSS scores. Remote Information Disclosure vulnerability in OpenSSH - CVE-2012-0814 CVSS v2 Base Score: See NVD advisory for the CVSS score. Multiple vulnerabilities in Oracle Java and Apache Tomcat: This release also contains critical security updates for Oracle Java and Apache Tomcat. Oracle Java has been upgraded to 1.6.0_45 and Apache tomcat has been upgraded to 6.0.36. Please refer the following links for more information: Java: http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html Tomcat: https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.36 CVSS v2 Base Score: See vendor advisory for the individual CVSS scores. Resolution: EMC recommends all customers to upgrade to VPLEX GeoSynchrony version 5.3 at their earliest opportunity. Link to remedies: Customers can download the software from Support Zone. Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (Cygwin) iEYEARECAAYFAlMy6mgACgkQtjd2rKp+ALwqbACgmMupmaxQ1GTwg1a1onHdgo4Q BxYAn1iAOq12nZ2WudlyECe9hrNp/DEc =7q/t -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201405-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: OpenSSH: Multiple vulnerabilities Date: May 11, 2014 Bugs: #231292, #247466, #386307, #410869, #419357, #456006, #505066 ID: 201405-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSH, the worst of which may allow remote attackers to execute arbitrary code. Background ========== OpenSSH is a complete SSH protocol implementation that includes an SFTP client and server support. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/openssh < 6.6_p1-r1 >= 6.6_p1-r1 Description =========== Multiple vulnerabilities have been discovered in OpenSSH. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could execute arbitrary code, cause a Denial of Service condition, obtain sensitive information, or bypass environment restrictions. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSH users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-6.6_p1-r1" NOTE: One or more of the issues described in this advisory have been fixed in previous updates. They are included in this advisory for the sake of completeness. It is likely that your system is already no longer affected by them. References ========== [ 1 ] CVE-2008-5161 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161 [ 2 ] CVE-2010-4478 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478 [ 3 ] CVE-2010-4755 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755 [ 4 ] CVE-2010-5107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107 [ 5 ] CVE-2011-5000 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000 [ 6 ] CVE-2012-0814 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814 [ 7 ] CVE-2014-2532 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201405-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.25

sources: NVD: CVE-2012-0814 // JVNDB: JVNDB-2012-001239 // BID: 51702 // VULMON: CVE-2012-0814 // PACKETSTORM: 120781 // PACKETSTORM: 125919 // PACKETSTORM: 126580

AFFECTED PRODUCTS

vendor:openbsdmodel:opensshscope:eqversion:4.5

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:1.2

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:5.3

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:5.5

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:5.1

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:5.4

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:5.0

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:5.2

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:4.6

Trust: 1.6

vendor:openbsdmodel:opensshscope:eqversion:3.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.5.7

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.3p2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.8

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.3p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.9.9

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.0

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.9

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.5.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.4

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.5p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.5

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.3

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.2.3

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.3

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.9

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.5.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.2p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.3

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.5

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.5

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.3.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.2.27

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.7

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.9.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.6.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.3p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.0p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.7.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.2.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.4p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.6.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.0

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.8.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.7.1p2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.0.2p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.9p2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.2.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.4p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.0.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:lteversion:5.6

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.2.3p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.3

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.0.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.8

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.9

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.0p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.5.8

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.6

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:1.2.2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.1p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.9.9p2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:4.7

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.7.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.2.2p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.6.1p2

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.0.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.9p1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.8.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:2.1.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.9.1

Trust: 1.0

vendor:openbsdmodel:opensshscope:eqversion:3.4

Trust: 1.0

vendor:openbsdmodel:opensshscope:ltversion:5.7

Trust: 0.8

vendor:openbsdmodel:opensshscope:eqversion:5.6

Trust: 0.6

vendor:xeroxmodel:freeflow print server 93.e0.21cscope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 91.d2.32scope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 82.d1.44scope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 81.d0.73scope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 73.d2.33scope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 73.c5.11scope: - version: -

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:9

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.1

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:junipermodel:idpscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:system integrated management modulescope:eqversion:x2

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:flex system integrated management modulescope:eqversion:2

Trust: 0.3

vendor:ibmmodel:flex system chassis management modulescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management modulescope:eqversion:0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:emcmodel:vplex geosynchronyscope:eqversion:5.2.1

Trust: 0.3

vendor:emcmodel:vplex geosynchrony sp1scope:eqversion:5.2

Trust: 0.3

vendor:emcmodel:vplex geosynchronyscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:openssh-server 1:5.5p1-6+squeeze1scope: - version: -

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16.2

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

vendor:oraclemodel:solarisscope:neversion:11.1.7.5.0

Trust: 0.3

vendor:junipermodel:idp 5.1r4scope:neversion: -

Trust: 0.3

vendor:emcmodel:vplex geosynchronyscope:neversion:5.3

Trust: 0.3

sources: BID: 51702 // JVNDB: JVNDB-2012-001239 // CNNVD: CNNVD-201201-399 // NVD: CVE-2012-0814

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0814
value: LOW

Trust: 1.0

NVD: CVE-2012-0814
value: LOW

Trust: 0.8

CNNVD: CNNVD-201201-399
value: MEDIUM

Trust: 0.6

VULMON: CVE-2012-0814
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-0814
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2012-0814 // JVNDB: JVNDB-2012-001239 // CNNVD: CNNVD-201201-399 // NVD: CVE-2012-0814

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.8

sources: JVNDB: JVNDB-2012-001239 // NVD: CVE-2012-0814

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 120781 // PACKETSTORM: 126580 // CNNVD: CNNVD-201201-399

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201201-399

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001239

PATCH

title:657445url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445

Trust: 0.8

title:auth-options.curl:http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c

Trust: 0.8

title:auth-options.c.diffurl:http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53;r2=1.54

Trust: 0.8

title:CVE-2012-0814 Credentials Management vulnerability in SSHurl:https://blogs.oracle.com/sunsecurity/entry/cve_2012_0814_credentials_management

Trust: 0.8

title:Debian CVElist Bug Report Logs: openssh-server: Forced Command handling leaks private information to ssh clientsurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=118af0e3124b7ca54e16372b905cb734

Trust: 0.1

title:EHAPT-Group-Projecturl:https://github.com/Amnesthesia/EHAPT-Group-Project

Trust: 0.1

title:ssh-enumurl:https://github.com/kaio6fellipe/ssh-enum

Trust: 0.1

title:pigaturl:https://github.com/teamssix/pigat

Trust: 0.1

sources: VULMON: CVE-2012-0814 // JVNDB: JVNDB-2012-001239

EXTERNAL IDS

db:NVDid:CVE-2012-0814

Trust: 3.1

db:BIDid:51702

Trust: 1.9

db:OSVDBid:78706

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2012/01/26/15

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2012/01/27/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2012/01/27/4

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2012/01/26/16

Trust: 1.6

db:JUNIPERid:JSA10673

Trust: 1.6

db:JVNDBid:JVNDB-2012-001239

Trust: 0.8

db:CNNVDid:CNNVD-201201-399

Trust: 0.6

db:VULMONid:CVE-2012-0814

Trust: 0.1

db:PACKETSTORMid:120781

Trust: 0.1

db:PACKETSTORMid:125919

Trust: 0.1

db:PACKETSTORMid:126580

Trust: 0.1

sources: VULMON: CVE-2012-0814 // BID: 51702 // JVNDB: JVNDB-2012-001239 // PACKETSTORM: 120781 // PACKETSTORM: 125919 // PACKETSTORM: 126580 // CNNVD: CNNVD-201201-399 // NVD: CVE-2012-0814

REFERENCES

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445

Trust: 1.9

url:http://www.securityfocus.com/bid/51702

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10673

Trust: 1.6

url:http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3br2=1.54

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72756

Trust: 1.6

url:http://openwall.com/lists/oss-security/2012/01/27/4

Trust: 1.6

url:http://osvdb.org/78706

Trust: 1.6

url:http://openwall.com/lists/oss-security/2012/01/26/15

Trust: 1.6

url:http://openwall.com/lists/oss-security/2012/01/26/16

Trust: 1.6

url:http://openwall.com/lists/oss-security/2012/01/27/1

Trust: 1.6

url:http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0814

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0814

Trust: 0.9

url:http://packages.debian.org/squeeze/openssh-server

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100161262

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-0814

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-5107

Trust: 0.2

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0634

Trust: 0.1

url:https://tomcat.apache.org/security-6.html#fixed_in_apache_tomcat_6.0.36

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4110

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2002-2443

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1044

Trust: 0.1

url:http://web.nvd.nist.gov/)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0632

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0635

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4478

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5107

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201405-06.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4478

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4755

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5161

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5161

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2532

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-5000

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4755

Trust: 0.1

sources: BID: 51702 // JVNDB: JVNDB-2012-001239 // PACKETSTORM: 120781 // PACKETSTORM: 125919 // PACKETSTORM: 126580 // CNNVD: CNNVD-201201-399 // NVD: CVE-2012-0814

CREDITS

Bjoern Buerger

Trust: 0.3

sources: BID: 51702

SOURCES

db:VULMONid:CVE-2012-0814
db:BIDid:51702
db:JVNDBid:JVNDB-2012-001239
db:PACKETSTORMid:120781
db:PACKETSTORMid:125919
db:PACKETSTORMid:126580
db:CNNVDid:CNNVD-201201-399
db:NVDid:CVE-2012-0814

LAST UPDATE DATE

2024-11-23T19:42:21.181000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2012-0814date:2023-02-13T00:00:00
db:BIDid:51702date:2015-05-12T19:46:00
db:JVNDBid:JVNDB-2012-001239date:2013-05-27T00:00:00
db:CNNVDid:CNNVD-201201-399date:2023-04-23T00:00:00
db:NVDid:CVE-2012-0814date:2024-11-21T01:35:46.573

SOURCES RELEASE DATE

db:VULMONid:CVE-2012-0814date:2012-01-27T00:00:00
db:BIDid:51702date:2012-01-26T00:00:00
db:JVNDBid:JVNDB-2012-001239date:2012-02-01T00:00:00
db:PACKETSTORMid:120781date:2013-03-13T22:22:00
db:PACKETSTORMid:125919date:2014-03-27T22:22:22
db:PACKETSTORMid:126580date:2014-05-12T18:51:17
db:CNNVDid:CNNVD-201201-399date:2012-01-27T00:00:00
db:NVDid:CVE-2012-0814date:2012-01-27T19:55:01.063