Логотип exploitDog
bind: "CVE-2023-2283"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-2283"

Количество 13

Количество 13

ubuntu логотип

CVE-2023-2283

около 2 лет назад

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-2283

около 2 лет назад

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2023-2283

около 2 лет назад

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-2283

около 2 лет назад

A vulnerability was found in libssh, where the authentication check of ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-h9jw-g3xj-5hwg

около 2 лет назад

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-05381

около 2 лет назад

Уязвимость функции pki_verify_data_signature() библиотеки для аутентификации клиента LibSSH, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2023:3839

почти 2 года назад

Moderate: libssh security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6643

больше 1 года назад

ELSA-2023-6643: libssh security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3839

почти 2 года назад

ELSA-2023-3839: libssh security update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240329-18

около 1 года назад

Множественные уязвимости LibSSH

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0140-1

больше 1 года назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0539-1

больше 1 года назад

Security update for libssh

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0525-1

больше 1 года назад

Security update for libssh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-2283

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-2283

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 4.8
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2283

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2283

A vulnerability was found in libssh, where the authentication check of ...

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-h9jw-g3xj-5hwg

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-05381

Уязвимость функции pki_verify_data_signature() библиотеки для аутентификации клиента LibSSH, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
0%
Низкий
около 2 лет назад
rocky логотип
RLSA-2023:3839

Moderate: libssh security update

почти 2 года назад
oracle-oval логотип
ELSA-2023-6643

ELSA-2023-6643: libssh security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-3839

ELSA-2023-3839: libssh security update (MODERATE)

почти 2 года назад
redos логотип
ROS-20240329-18

Множественные уязвимости LibSSH

CVSS3: 6.5
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0140-1

Security update for libssh

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0539-1

Security update for libssh

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0525-1

Security update for libssh

больше 1 года назад

Уязвимостей на страницу