First published: Mon Jul 10 2023(Updated: )
A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh Libssh | ||
Libssh Libssh | <0.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3603 is a vulnerability in the Libssh library that allows a malicious client to cause a NULL dereference on low-memory conditions.
CVE-2023-3603 has a severity rating of medium with a CVSS score of 6.5.
CVE-2023-3603 can be exploited by a malicious client requesting up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which can lead to a NULL dereference and potentially crash the server.
To fix CVE-2023-3603, it is recommended to update to the latest version of the Libssh library that includes the patch for this vulnerability.
You can find more information about CVE-2023-3603 on the Red Hat Bugzilla page (https://bugzilla.redhat.com/show_bug.cgi?id=2221791) and the Red Hat Security Advisory (https://access.redhat.com/security/cve/CVE-2023-3603).