In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade libssh
to version 0.11.2 or higher.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound due to incorrect validity check in the sftp_decode_channel_data_to_packet()
function. An attacker can cause the server to crash by sending specially crafted SFTP packets with payload size field set to value 0x7ffffffc (2GB - 3B) that trigger an integer overflow during memory allocation attempts.
Note:
This is only exploitable for sftp servers running on on 32-bit platforms.