Several vulnerabilities were discovered in libssh, a tiny C SSH library.
CVE-2023-6004
It was reported that using the ProxyCommand or the ProxyJump feature
may allow an attacker to inject malicious code through specially
crafted hostnames.
CVE-2023-6918
Jack Weinstein reported that missing checks for return values for
digests may result in denial of service (application crashes) or
usage of uninitialized memory.
CVE-2023-48795
Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that
the SSH protocol is prone to a prefix truncation attack, known as
the “Terrapin attack”. This attack allows a MITM attacker to effect
a limited break of the integrity of the early encrypted SSH
transport protocol by sending extra messages prior to the
commencement of encryption, and deleting an equal number of
consecutive messages immediately after encryption starts.
Details can be found at https://terrapin-attack.com/
More Stories
USN-7400-1: PHP vulnerabilities
It was discovered that PHP incorrectly handle certain inputs. An attacker could possibly use this issue to cause a crash...
USN-7399-1: RabbitMQ Server vulnerability
It was discovered that RabbitMQ Server's management UI did not sanitize certain input. An attacker could possibly use this issue...
USN-7398-1: libtar vulnerabilities
It was discovered that libtar may perform out-of-bounds reads when processing specially crafted tar files. An attacker could possibly use...
USN-7397-1: AOM vulnerability
Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a...
USN-7396-1: OVN vulnerability
Marius Berntsberg, Trygve Vea, Tore Anderson, Rodolfo Alonso, Jay Faulkner, and Brian Haley discovered that OVN incorrectly handled certain crafted...
USN-7395-1: WebKitGTK vulnerabilities
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a...