First published: Wed Jul 29 2020(Updated: )
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh Libssh | =0.9.4 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
debian/libssh | 0.9.8-0+deb11u1 0.10.6-0+deb12u1 0.10.6-3 | |
ubuntu/libssh | <0.8.0~20170825.94 | 0.8.0~20170825.94 |
ubuntu/libssh | <0.9.3-2ubuntu2.1 | 0.9.3-2ubuntu2.1 |
ubuntu/libssh | <0.6.3-4.3ubuntu0.6 | 0.6.3-4.3ubuntu0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16135 is a vulnerability in Libssh that can lead to a denial of service by causing the application to crash.
CVE-2020-16135 affects IBM QRadar SIEM versions 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10.
CVE-2020-16135 has a severity rating of 7.5 (high).
To fix CVE-2020-16135, you can apply the official patches provided by IBM for the affected versions of QRadar SIEM. You can find the patches on the IBM Support website.
You can find more information about CVE-2020-16135 on the following websites: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1862457), [Gentoo](https://bugs.gentoo.org/734624), and [GitLab](https://gitlab.com/libssh/libssh-mirror/-/commit/533d881b0f4b24c72b35ecc97fa35d295d063e53).