• CVE-2023-2283

发布时间: 2023年5月26日

修改时间: 2024年10月31日

概要

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS v3 指标

NVD openEuler
Confidentiality Low Low
Attack Vector Network Network
CVSS评分 6.5 6.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity Low Low
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1371 libssh security update 2023年5月26日
KylinSec-SA-2023-1442 libssh security update 2023年6月3日
KylinSec-SA-2023-1455 libssh security update 2023年6月3日
KylinSec-SA-2023-2170 libssh security update 2023年6月3日

影响产品

产品 状态
KY3.4-4A libssh Fixed
KY3.4-5A libssh Fixed
KY3.5.1 libssh Fixed
KY3.5.2 libssh Fixed