Описание
[Denial of Service due to malformed SFTP message]
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.11.3-1ubuntu1 |
| esm-infra/bionic | released | 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm6 |
| esm-infra/focal | released | 0.9.3-2ubuntu2.5+esm3 |
| esm-infra/xenial | released | 0.6.3-4.3ubuntu0.6+esm4 |
| jammy | released | 0.9.6-2ubuntu0.22.04.6 |
| noble | released | 0.10.6-2ubuntu0.3 |
| questing | released | 0.11.2-1ubuntu0.2 |
| upstream | needs-triage |
Показывать по
EPSS
Связанные уязвимости
A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.
A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.
EPSS