First published: Tue Oct 30 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team reported several instances of code in libssh where a heap region is deallocated twice, first in the main path and then on the error path. This could crash the process using libssh, or possible allow for the execution of arbitrary code. The identified affected variables are: agent.c:agent_sign_data(): request channels.c:channel_request(): req auth.c:ssh_userauth_pubkey(): user, service, method, algo, pkstr sftp.c:sftp_parse_attr_3(): longname, name sftp.c:sftp_mkdir(): buffer, path keyfiles.c:try_publickey_from_file(): pubkey sftp.c:sftp_mkdir() has been corrected via the following git commit: <a href="http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=4d8420f3282ed07fc99fc5e930c17df27ef1e9b2">http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=4d8420f3282ed07fc99fc5e930c17df27ef1e9b2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libssh | <0.5.3 | 0.5.3 |
Ubuntu | <=0.5.2 | |
Ubuntu | =0.4.7 | |
Ubuntu | =0.4.8 | |
Ubuntu | =0.5.0 | |
Ubuntu | =0.5.0-rc1 | |
Ubuntu | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4559 has been classified with a critical severity due to the potential for arbitrary code execution or process crashes.
To fix CVE-2012-4559, upgrade libssh to version 0.5.4 or higher, which contains the necessary security patches.
Versions of libssh prior to 0.5.4, including 0.5.3 and earlier, are affected by CVE-2012-4559.
The potential risks of CVE-2012-4559 include application crashes or the execution of arbitrary code, compromising system integrity.
If you are using libssh version 0.5.3 or earlier, your system is vulnerable to CVE-2012-4559.