发布时间: 2023年7月20日
修改时间: 2024年2月26日
Given this code is not in any released versions, no security release hasbeen issued.Missing allocation check in sftp server processing read requests maycause NULL dereference on low-memory conditions. The malicious clientcan request up to 4GB SFTP reads, causing allocation of up to 4GB buffers,which is being unchecked for failure.This will likely crash the authenticated user sftp server s connection(if implemented as forking as we recommend). For thread-basedservers, this might cause DoS also for legitimate users.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Network | Network |
CVSS评分 | 6.5 | 3.1 |
Attack Complexity | Low | High |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1544 | Given this code is not in any released versions, no security release hasbeen issued.Missing allocation check in sftp server processing read requests maycause NULL dereference on low-memory conditions. The malicious clientcan request up to 4GB SFTP reads, causing allocation of up to 4GB buffers,which is being unchecked for failure.This will likely crash the authenticated user sftp server s connection(if implemented as forking as we recommend). For thread-basedservers, this might cause DoS also for legitimate users. | 2023年7月20日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | libssh | Unaffected |
KY3.4-5A | libssh | Unaffected |
KY3.5.1 | libssh | Unaffected |
KY3.5.2 | libssh | Unaffected |