Access Restriction Bypass Affecting libssh package, versions [0.9.0, 0.9.7)[0.10.0,0.10.5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.27% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-LIBSSH-5500156
  • published8 May 2023
  • disclosed5 May 2023
  • creditKevin Backhouse

Introduced: 5 May 2023

CVE-2023-2283  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade libssh to version 0.9.7, 0.10.5 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass via the function pki_verify_data_signature in circumstances of memory allocation problems.

This vulnerability is caused by the return value rc, which is initialized to SSH_ERROR and later rewritten to save the return value of the function call pki_key_check_hash_compatible. The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls goto error returning SSH_OK.

Note: Ed25519 key support is not affected in versions 0.9.x as it uses a different code path, but versions 0.10.x are affected. Only OpenSSL cryptographic backend is affected.

CVSS Base Scores

version 3.1