• 公告ID (KylinSec-SA-2023-1544)

摘要:

Given this code is not in any released versions, no security release hasbeen issued.Missing allocation check in sftp server processing read requests maycause NULL dereference on low-memory conditions. The malicious clientcan request up to 4GB SFTP reads, causing allocation of up to 4GB buffers,which is being unchecked for failure.This will likely crash the authenticated user sftp server s connection(if implemented as forking as we recommend). For thread-basedservers, this might cause DoS also for legitimate users.

安全等级: Low

公告ID: KylinSec-SA-2023-1544

发布日期: 2023年7月20日

关联CVE: CVE-2023-3603  

  • 详细介绍

1. 漏洞描述

   

Given this code is not in any released versions, no security release hasbeen issued.Missing allocation check in sftp server processing read requests maycause NULL dereference on low-memory conditions. The malicious clientcan request up to 4GB SFTP reads, causing allocation of up to 4GB buffers,which is being unchecked for failure.This will likely crash the authenticated user sftp server s connection(if implemented as forking as we recommend). For thread-basedservers, this might cause DoS also for legitimate users.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-3603 KY3.4-4A libssh Unaffected
CVE-2023-3603 KY3.4-5A libssh Unaffected
CVE-2023-3603 KY3.5.1 libssh Unaffected
CVE-2023-3603 KY3.5.2 libssh Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1543 下一篇:KylinSec-SA-2023-1545