| Summary | A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange. |
|---|---|
| Publication Date | Sept. 1, 2021, 2:15 a.m. |
| Registration Date | Sept. 1, 2021, 10 a.m. |
| Last Update | Nov. 21, 2024, 3:22 p.m. |
| CVSS3.1 : MEDIUM | |
| スコア | 6.5 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 4.0 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 単一 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* | 0.9.1 | 0.9.6 | |||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* | 8.0.27 | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* | |||||
| Title | libssh における境界外書き込みに関する脆弱性 |
|---|---|
| Summary | libssh には、境界外書き込みに関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | July 2, 2021, midnight |
| Registration Date | July 28, 2022, 4:13 p.m. |
| Last Update | July 28, 2022, 4:13 p.m. |
| レッドハット |
| Red Hat Virtualization |
| オラクル |
| MySQL Workbench |
| Debian |
| Debian GNU/Linux |
| Fedora Project |
| Fedora |
| NetApp |
| NetApp Cloud Backup |
| libssh |
| libssh 0.9.6 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2022年07月28日] 掲載 |
July 28, 2022, 4:13 p.m. |