BSA-2017-246

Brocade Fabric OS

2 more products

21684

15 July 2019

28 April 2017

Closed

High

7.3

N/A

CVE-2014-1692

Summary

Security Advisory ID : BSA-2017-246

Component : FOS

Revision : 2.0: Final

The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.

Products Confirmed Not Vulnerable

No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.

Revision History

Version Change Date
1.0 Initial Publication August 25, 2017
2.0 Updated to keep Fibre Channel Products only July 15, 2019