SB2022100428 - Multiple vulnerabilities in OpenSSH
Published: October 4, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing SSH banners in ssh-keyscan(1). A remote attacker can use a specially crafted banner to trigger a one-byte buffer overflow and perform a denial of service (DoS) attack.
2) Double Free (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in ssh-keygen(1) when reading files. A remote attacker can trick the victim into using a specially crafted file to trigger a double free error when handling the path of file hashing step in signing/verify code and crash the application.
3) Double Free (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The
vulnerability exists due to a boundary error in ssh-keysign(8) when
reading files. A remote attacker can trick the victim into using a
specially crafted file to trigger a double free error and crash the
application.
Remediation
Install update from vendor's website.