First published: Fri Apr 13 2018(Updated: )
sshpk is vulnerable to ReDoS when parsing crafted invalid public keys.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joyent Sshpk | <=1.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3737 is a vulnerability in sshpk that allows for ReDoS attacks when parsing crafted invalid public keys.
CVE-2018-3737 has a severity rating of high, with a severity value of 7.5.
The following software versions are affected by CVE-2018-3737: sshpk 1.14.1, sshpk 1.3.2, and Joyent Sshpk up to version 1.13.1.
To fix CVE-2018-3737, update sshpk to version 1.14.1 (for sshpk 1.14.1), version 1.3.2 (for sshpk 1.3.2), or a version later than 1.13.1 (for Joyent Sshpk).
You can find more information about CVE-2018-3737 at the following references: [GitHub Issue](https://github.com/joyent/node-sshpk/issues/44), [GitHub Commit](https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957), [HackerOne Report](https://hackerone.com/reports/319593).