发布时间: 2022年10月24日
修改时间: 2022年10月24日
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Network | Network |
CVSS评分 | 8.1 | 8.1 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | Required | Required |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2020-1068 | In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | 2022年10月24日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | libssh2 | Unaffected |
KY3.4-5A | libssh2 | Unaffected |
KY3.5.1 | libssh2 | Unaffected |