First published: Wed Apr 13 2016(Updated: )
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh Libssh | <=0.6.4 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.