CVE-2023-3603

A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2221791 Issue Tracking Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-3603 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

History

23 May 2024, 17:56

Type Values Removed Values Added
CWE CWE-770 CWE-476
CPE cpe:2.3:a:libssh:libssh:-:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

01 Aug 2023, 14:44

Type Values Removed Values Added
CWE CWE-770
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:libssh:libssh:-:*:*:*:*:*:*:*
First Time Libssh libssh
Libssh
References (MISC) https://access.redhat.com/security/cve/CVE-2023-3603 - (MISC) https://access.redhat.com/security/cve/CVE-2023-3603 - Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2221791 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2221791 - Issue Tracking, Third Party Advisory

21 Jul 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-21 20:15

Updated : 2024-05-23 17:56


NVD link : CVE-2023-3603

Mitre link : CVE-2023-3603


JSON object : View

Products Affected

libssh

  • libssh
CWE
CWE-476

NULL Pointer Dereference