CVE-2023-3603

A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2023-3603 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2221791 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

History

23 May 2024, 17:56

Type Values Removed Values Added
CPE cpe:2.3:a:libssh:libssh:-:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
CWE CWE-770

01 Aug 2023, 14:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Libssh
Libssh libssh
CPE cpe:2.3:a:libssh:libssh:-:*:*:*:*:*:*:*
References (MISC) https://access.redhat.com/security/cve/CVE-2023-3603 - (MISC) https://access.redhat.com/security/cve/CVE-2023-3603 - Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2221791 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2221791 - Issue Tracking, Third Party Advisory
CWE CWE-770

21 Jul 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-21 20:15

Updated : 2024-05-23 17:56


NVD link : CVE-2023-3603

Mitre link : CVE-2023-3603

CVE.ORG link : CVE-2023-3603


JSON object : View

Products Affected

libssh

  • libssh
CWE
CWE-476

NULL Pointer Dereference