BSA-2017-246
21684
15 July 2019
28 April 2017
Closed
High
7.3
N/A
CVE-2014-1692
Summary Security Advisory ID : BSA-2017-246 Component : FOS Revision : 2.0: Final
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
Products Confirmed Not Vulnerable
No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.
Workaround
There are no workarounds that address this vulnerability.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | August 25, 2017 |
2.0 | Updated to keep Fibre Channel Products only | July 15, 2019 |