The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
Advisories
Source ID Title
EUVD EUVD EUVD-2011-0557 The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T21:58:25.891Z

Reserved: 2011-01-20T00:00:00

Link: CVE-2011-0539

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-02-10T18:00:57.660

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-0539

cve-icon Redhat

Severity : Low

Publid Date: 2011-02-04T00:00:00Z

Links: CVE-2011-0539 - Bugzilla

cve-icon OpenCVE Enrichment

No data.