Vulnerability CVE-2023-2283: Information

Description

A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.

Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Published: May 26, 2023
Modified: Feb. 1, 2024
Error type identifier: CWE-287

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
libsshsisyphus0.9.7-alt10.10.6-alt1ALT-PU-2023-4108-1324287Fixed
libsshsisyphus_e2k0.10.5-alt10.10.6-alt1ALT-PU-2023-4192-1-Fixed
libsshsisyphus_riscv640.10.5-alt10.10.6-alt1ALT-PU-2023-4216-1-Fixed
libsshp100.9.7-alt10.10.6-alt1ALT-PU-2023-4094-2324288Fixed
libsshp10_e2k0.10.5-alt10.10.6-alt1ALT-PU-2023-5088-1-Fixed
libsshc10f10.10.5-alt10.10.6-alt1ALT-PU-2023-4685-3326303Fixed
libsshc9f20.10.5-alt10.10.6-alt1ALT-PU-2023-4683-3326302Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
      Start including
      0.10.0
      End including
      0.10.4

      cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
      Start including
      0.9.1
      End including
      0.9.6

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*