Описание
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.6.3-4.2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [0.6.1-0ubuntu3.3]] |
| precise | released | 0.5.2-1ubuntu0.12.04.6 |
| trusty | released | 0.6.1-0ubuntu3.3 |
| trusty/esm | DNE | trusty was released [0.6.1-0ubuntu3.3] |
| upstream | released | 0.6.5 |
| utopic | ignored | end of life |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in ...
EPSS
5 Medium
CVSS2
7.5 High
CVSS3