First published: Tue Oct 30 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team reported the existence of several unitialized heap allocations in the following functions: keys.c:publickey_make_dss() (key) keys.c:publickey_make_rsa() (key) keys.c:signature_from_string() (sign) keys.c:ssh_do_sign() (sign) keys.c:ssh_sign_session_id() (sign) This could lead to freeing an invalid pointer on an error path, which could lead to a crash in the process using libssh.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libssh | <0.5.3 | 0.5.3 |
libssh | <=0.5.2 | |
libssh | =0.4.7 | |
libssh | =0.4.8 | |
libssh | =0.5.0 | |
libssh | =0.5.0-rc1 | |
libssh | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4561 is classified as a moderate severity vulnerability due to potential impacts from uninitialized heap allocations.
To fix CVE-2012-4561, update libssh to version 0.5.3 or later.
CVE-2012-4561 affects versions of libssh up to 0.5.2 and specific versions like 0.4.7, 0.4.8, 0.5.0, and 0.5.1.
CVE-2012-4561 involves uninitialized heap allocations in various public key and signing functions within libssh.
CVE-2012-4561 was reported by Florian Weimer of the Red Hat Product Security Team.