安全公告/【CVE-2023-2283】

基本信息

漏洞名称:
受影响操作系统:Asianux
危险等级:中危
影响源码包:libssh
CVSS评分:6.5
发现日期:2023-09-01
修复版本:libssh-0.9.6-7.01

漏洞描述

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

修复方式

yum update PackageName

漏洞判定

执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://access.redhat.com/security/cve/CVE-2023-2283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283
https://nvd.nist.gov/vuln/detail/CVE-2023-2283