First published: Wed Apr 13 2016(Updated: )
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libssh | <=0.6.4 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =21 | |
Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3146 is categorized as a denial of service vulnerability due to a NULL pointer dereference.
To fix CVE-2015-3146, update libssh to version 0.6.5 or later.
Libssh versions prior to 0.6.5, including all versions up to and including 0.6.4, are affected.
CVE-2015-3146 affects various Linux distributions including Ubuntu, Debian, and Fedora.
Yes, CVE-2015-3146 can be exploited remotely by sending crafted SSH packets.