Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-6918

Опубликовано: 25 дек. 2023
Источник: msrc
CVSS3: 5.3
EPSS Низкий

Описание

Описание отсутствует

EPSS

Процентиль: 58%
0.00363
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 2 лет назад

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVSS3: 3.7
redhat
около 2 лет назад

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVSS3: 3.7
nvd
около 2 лет назад

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVSS3: 3.7
debian
около 2 лет назад

A flaw was found in the libssh implements abstract layer for message d ...

CVSS3: 3.7
github
около 2 лет назад

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

EPSS

Процентиль: 58%
0.00363
Низкий

5.3 Medium

CVSS3