Mandriva Linux Security Advisory : libssh (MDVSA-2015:086)

medium Nessus Plugin ID 82339


The remote Mandriva Linux host is missing one or more security updates.


Updated libssh packages fix security vulnerabilities :

When using libssh before 0.6.3, a libssh-based server, when accepting a new connection, forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC (ECDSA) or DSA certificates may under certain conditions leak their private key (CVE-2014-0017).

Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet (CVE-2014-8132).


Update the affected lib64ssh-devel and / or lib64ssh4 packages.

See Also

Plugin Details

Severity: Medium

ID: 82339

File Name: mandriva_MDVSA-2015-086.nasl

Version: 1.4

Type: local

Published: 3/30/2015

Updated: 1/14/2021

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64ssh-devel, p-cpe:/a:mandriva:linux:lib64ssh4, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/28/2015

Reference Information

CVE: CVE-2014-0017, CVE-2014-8132

MDVSA: 2015:086