{"id":"CVE-2014-2653","details":"The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.","modified":"2026-04-16T06:24:39.868861170Z","published":"2014-03-27T10:55:04Z","references":[{"type":"ADVISORY","url":"http://advisories.mageia.org/MGASA-2014-0166.html"},{"type":"ADVISORY","url":"http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1552.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-0425.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59855"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2894"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:095"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2164-1"},{"type":"EVIDENCE","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=141576985122836&w=2"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2014/03/26/7"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/66459"}],"schema_version":"1.7.5"}