CVE-2013-4548

Publication date 8 November 2013

Last updated 24 July 2024


Ubuntu priority

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

Read the notes from the security team

Status

Package Ubuntu Release Status
openssh 13.10 saucy
Fixed 1:6.2p2-6ubuntu0.1
13.04 raring
Not affected
12.10 quantal
Not affected
12.04 LTS precise
Not affected
10.04 LTS lucid
Not affected

Notes


mdeslaur

only affects openssh 6.2+ as that is when AES-GCM support was introduced

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openssh

References

Related Ubuntu Security Notices (USN)

    • USN-2014-1
    • OpenSSH vulnerability
    • 8 November 2013

Other references