Authentication Bypass in libssh Affects Multiple Versions
CVE-2023-2283
6.5MEDIUM
What is CVE-2023-2283?
A vulnerability has been identified in libssh that allows an attacker to bypass the authentication check when connecting to a server. This issue arises in the pki_verify_data_signature function due to potential memory allocation problems. When memory is insufficient or usage is limited, the return value of the function can remain inappropriately set, leading to a scenario where errors are not correctly handled. The rc value, initially set to SSH_ERROR, is overwritten without proper checks, which compromises the integrity of the cryptographic verification and ultimately allows unauthorized access.
Affected Version(s)
libssh libssh-2
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
