Vulnerability Details : CVE-2014-8132
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2014-8132
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:libssh:libssh:0.6.3:*:*:*:*:*:*:*
Threat overview for CVE-2014-8132
Top countries where our scanners detected CVE-2014-8132
Top open port discovered on systems with this issue
22
IPs affected by CVE-2014-8132 881
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-8132!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-8132
12.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8132
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2014-8132
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147464.html
[SECURITY] Fedora 21 Update: libssh-0.6.4-1.fc21Third Party Advisory
-
http://advisories.mageia.org/MGASA-2015-0014.html
Mageia Advisory: MGASA-2015-0014 - Updated libssh packages fix CVE-2014-8132Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:020
mandriva.comThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html
openSUSE-SU-2015:0017-1: moderate: Security update for libsshThird Party Advisory
-
http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
libssh 0.6.4 (Security and bugfix release) – libsshPatch;Vendor Advisory
-
http://www.debian.org/security/2016/dsa-3488
Debian -- Security Information -- DSA-3488-1 libsshThird Party Advisory
-
https://security.gentoo.org/glsa/201606-12
libssh and libssh2: Multiple vulnerabilities (GLSA 201606-12) — Gentoo securityThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147367.html
503 Backend fetch failedThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147452.html
[SECURITY] Fedora 20 Update: libssh-0.6.4-1.fc20Third Party Advisory
-
http://secunia.com/advisories/60838
Sign in
-
https://bugzilla.redhat.com/show_bug.cgi?id=1158089
1158089 – (CVE-2014-8132) CVE-2014-8132 libssh: Possible double free on a dangling pointer with crafted kexinit packetIssue Tracking;Third Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2478-1
USN-2478-1: libssh vulnerability | Ubuntu security noticesThird Party Advisory
Jump to