Upstream information

CVE-2013-4548 at MITRE

Description

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6
Vector AV:N/AC:M/Au:S/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Note from the SUSE Security Team

Our openssl version currently in SUSE Linux Enterprise Server 11 does not support AES-GCM, so openssh is built without this support. So SUSE Linux Enterprise Server 11 and older are not affected by this security issue. OpenSUSE 13.1 is affected by this problem. openSUSE 12.3 and older versions use older openssh versions without support for this cipher, and so are not affected.

SUSE Bugzilla entry: 849536 [RESOLVED / FIXED]

SUSE Security Advisories:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
Carwos 1 openssh Analysis
HPE Helion OpenStack 8 openssh Analysis
SUSE CaaS Platform 4.0 openssh Analysis
SUSE Enterprise Storage 6 openssh Analysis
SUSE Linux Enterprise High Performance Computing 12 SP5 openssh Analysis
SUSE Linux Enterprise High Performance Computing 15 LTSS openssh Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS openssh Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP2 openssh Analysis
SUSE Linux Enterprise Module for Server Applications 15 SP2 openssh Analysis
SUSE Linux Enterprise Point of Service 11 SP3 openssh Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS openssh Analysis
SUSE Linux Enterprise Server 12 SP2 BCL openssh Analysis
SUSE Linux Enterprise Server 12 SP2 LTSS ERICSSON openssh Analysis
SUSE Linux Enterprise Server 12 SP2 LTSS SAP openssh Analysis
SUSE Linux Enterprise Server 12 SP3 BCL openssh Analysis
SUSE Linux Enterprise Server 12 SP3 ESPOS openssh Analysis
SUSE Linux Enterprise Server 12 SP3 LTSS openssh Analysis
SUSE Linux Enterprise Server 12 SP4 ESPOS openssh Analysis
SUSE Linux Enterprise Server 12 SP4 LTSS openssh Analysis
SUSE Linux Enterprise Server 12 SP5 openssh Analysis
SUSE Linux Enterprise Server 15 LTSS openssh Analysis
SUSE Linux Enterprise Server 15 SP1 Business Critical Linux openssh Analysis
SUSE Linux Enterprise Server 15 SP1 LTSS openssh Analysis
SUSE Linux Enterprise Server ESPOS 15 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP3 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP4 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP5 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 15 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP1 openssh Analysis
SUSE Manager Proxy 4.0 openssh Unsupported
SUSE Manager Retail Branch Server 4.0 openssh Unsupported
SUSE Manager Server 4.0 openssh Unsupported
SUSE OpenStack Cloud 8 openssh Analysis
SUSE OpenStack Cloud 9 openssh Analysis
SUSE OpenStack Cloud Crowbar 8 openssh Analysis
SUSE OpenStack Cloud Crowbar 9 openssh Analysis