Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-6918
HistoryDec 19, 2023 - 12:00 a.m.

CVE-2023-6918

2023-12-1900:00:00
ubuntu.com
ubuntu.com
17
libssh
message digest operations
crypto backends
low-memory
null dereferences
crashes
uninitialized memory
decryption failures
integrity failures
connection termination

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.2%

A flaw was found in the libssh implements abstract layer for message digest
(MD) operations implemented by different supported crypto backends. The
return values from these were not properly checked, which could cause
low-memory situations failures, NULL dereferences, crashes, or usage of the
uninitialized memory as an input for the KDF. In this case, non-matching
keys will result in decryption/integrity failures, terminating the
connection.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlibssh< 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3UNKNOWN
ubuntu20.04noarchlibssh< 0.9.3-2ubuntu2.5UNKNOWN
ubuntu22.04noarchlibssh< 0.9.6-2ubuntu0.22.04.3UNKNOWN
ubuntu23.04noarchlibssh< 0.10.4-2ubuntu0.3UNKNOWN
ubuntu23.10noarchlibssh< 0.10.5-3ubuntu1.2UNKNOWN
ubuntu16.04noarchlibssh< 0.6.3-4.3ubuntu0.6+esm1UNKNOWN

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.2%