CVE-2023-2283
26.05.2023, 18:15
A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.Enginsight
Vendor | Product | Version |
---|---|---|
libssh | libssh | 0.9.1 ≤ 𝑥 ≤ 0.9.6 |
libssh | libssh | 0.10.0 ≤ 𝑥 ≤ 0.10.4 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References