Описание
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
Отчет
The Red Hat Product Security team has assessed the severity of this vulnerability as Moderate, given that it is only exploitable on 32-bit systems by authenticated users with SFTP access. The issue stems from an integer overflow in packet length validation that causes excessive memory allocation attempts, leading to a crash in the SFTP server. While the flaw does not enable memory corruption or code execution, it can disrupt availability for legitimate users. No Red Hat products or offerings are affected by this vulnerability.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | libssh | Not affected | ||
Red Hat Enterprise Linux 6 | libssh2 | Not affected | ||
Red Hat Enterprise Linux 7 | libssh2 | Not affected | ||
Red Hat Enterprise Linux 8 | libssh | Not affected | ||
Red Hat Enterprise Linux 9 | libssh | Not affected | ||
Red Hat OpenShift Container Platform 4 | rhcos | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS3
Связанные уязвимости
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
A flaw was found in the SFTP server message decoding logic of libssh. ...
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
Уязвимость функции sftp_decode_channel_data_to_packet() библиотеки libssh, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
4.3 Medium
CVSS3