Authentication Bypass in libssh Affects Multiple Versions
CVE-2023-2283

6.5MEDIUM

Key Information:

Vendor

Libssh

Status
Vendor
CVE Published:
26 May 2023

What is CVE-2023-2283?

A vulnerability has been identified in libssh that allows an attacker to bypass the authentication check when connecting to a server. This issue arises in the pki_verify_data_signature function due to potential memory allocation problems. When memory is insufficient or usage is limited, the return value of the function can remain inappropriately set, leading to a scenario where errors are not correctly handled. The rc value, initially set to SSH_ERROR, is overwritten without proper checks, which compromises the integrity of the cryptographic verification and ultimately allows unauthorized access.

Affected Version(s)

libssh libssh-2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-2283 : Authentication Bypass in libssh Affects Multiple Versions