Deserialization of Untrusted Data Affecting apache-sshd package, versions <2.12.0-150200.5.8.1


Severity

Recommended
0.0
critical
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.51% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Deserialization of Untrusted Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES154-APACHESSHD-6191829
  • published26 Jan 2024
  • disclosed25 Jan 2024

Introduced: 25 Jan 2024

CVE-2022-45047  (opens in a new tab)
CWE-502  (opens in a new tab)

How to fix?

Upgrade SLES:15.4 apache-sshd to version 2.12.0-150200.5.8.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apache-sshd package and not the apache-sshd package as distributed by SLES. See How to fix? for SLES:15.4 relevant fixed versions and status.

Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.

CVSS Scores

version 3.1