OpenSSH memory corruption issue (CVE-2014-1692) in RSA Authentication Manager - False Positive
Originally Published: 2016-03-02
Article Number
Applies To
CVE Identifier(s)
Article Summary
CVE-2014-1692
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.CVSS v2 Base Score: 7.5 HIGH
Link to Advisories
Alert Impact
Not Applicable
Alert Impact Explanation
The SUSE version of SSH is not impacted.
Notes
We do not enable JPAKE support in our openSSH releases, so SUSE Linux Enterprise and openSUSE are not affected by this problem.
Disclaimer
Related Articles
DSA-2019-047: RSA Authentication Manager Security Update for OpenSSH Embedded Component Vulnerabilities 33Number of Views Microprocessor Side-Channel Vulnerabilities (CVE-2018-3639 and CVE-2018-3640): Impact on RSA products 95Number of Views CVE-2021-41617 Security vulnerability for RSA Authentication Manager 8.6.x 187Number of Views Response to OpenSSH Vulnerabilities on RSA Authentication Manager 8.8 - CVE-2023-51385, CVE-2023-51767, CVE-2023-51384 82Number of Views Security scan shows a possible denial of service vulnerability 20Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?