First published: Tue Feb 05 2013(Updated: )
The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libssh | <=0.5.3 | |
libssh | =0.4.7 | |
libssh | =0.4.8 | |
libssh | =0.5.0 | |
libssh | =0.5.0-rc1 | |
libssh | =0.5.1 | |
libssh | =0.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0176 has a severity rating of medium due to its potential for denial of service.
To fix CVE-2013-0176, upgrade to libssh version 0.5.4 or newer.
CVE-2013-0176 affects libssh versions prior to 0.5.4, specifically versions 0.4.7, 0.4.8, 0.5.0, 0.5.1, and 0.5.2.
CVE-2013-0176 is caused by a NULL pointer dereference when no algorithm is matched during the key exchange negotiations.
Yes, CVE-2013-0176 can be exploited remotely through specially crafted 'Client: Diffie-Hellman Key Exchange Init' packets.