Unsafe Memory Allocation in Russh Could Lead to OOMs
CVE-2024-43410

7.5HIGH

Key Information:

Vendor

Eugeny

Status
Vendor
CVE Published:
21 August 2024

What is CVE-2024-43410?

The Russh SSH client and server library experiences a vulnerability that arises from untrusted memory allocation. An unauthenticated attacker can exploit this issue by sending specially crafted SSH packets containing a manipulated 4-byte length header. This header value allows the attacker to allocate an excessive amount of memory, leading to a denial of service condition as the target russh server exhausts its memory resources and becomes unresponsive. The vulnerability has been addressed in version 0.44.1 of Russh, which implements checks to prevent allocation of untrusted values.

Affected Version(s)

russh < 0.44.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.