CVE-2023-6918

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
redhatCNA
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 58%
VendorProductVersion
libsshlibssh
0.9.0 ≤
𝑥
< 0.9.8
libsshlibssh
0.10.0 ≤
𝑥
< 0.10.6
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libssh
bullseye (security)
0.9.8-0+deb11u1
fixed
bullseye
0.9.8-0+deb11u1
fixed
bookworm
0.10.6-0+deb12u1
fixed
bookworm (security)
0.10.6-0+deb12u1
fixed
trixie
0.11.1-1
fixed
sid
0.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libssh
mantic
Fixed 0.10.5-3ubuntu1.2
released
lunar
Fixed 0.10.4-2ubuntu0.3
released
jammy
Fixed 0.9.6-2ubuntu0.22.04.3
released
focal
Fixed 0.9.3-2ubuntu2.5
released
bionic
Fixed 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3
released
xenial
Fixed 0.6.3-4.3ubuntu0.6+esm1
released
trusty
ignored