摘要:
Given this code is not in any released versions, no security release hasbeen issued.Missing allocation check in sftp server processing read requests maycause NULL dereference on low-memory conditions. The malicious clientcan request up to 4GB SFTP reads, causing allocation of up to 4GB buffers,which is being unchecked for failure.This will likely crash the authenticated user sftp server s connection(if implemented as forking as we recommend). For thread-basedservers, this might cause DoS also for legitimate users.
安全等级: Low
公告ID: KylinSec-SA-2023-1544
发布日期: 2023年7月20日
关联CVE: CVE-2023-3603
Given this code is not in any released versions, no security release hasbeen issued.Missing allocation check in sftp server processing read requests maycause NULL dereference on low-memory conditions. The malicious clientcan request up to 4GB SFTP reads, causing allocation of up to 4GB buffers,which is being unchecked for failure.This will likely crash the authenticated user sftp server s connection(if implemented as forking as we recommend). For thread-basedservers, this might cause DoS also for legitimate users.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-3603 | KY3.4-4A | libssh | Unaffected |
CVE-2023-3603 | KY3.4-5A | libssh | Unaffected |
CVE-2023-3603 | KY3.5.1 | libssh | Unaffected |
CVE-2023-3603 | KY3.5.2 | libssh | Unaffected |