Vulnerabilities > CVE-2023-6918 - Unchecked Return Value vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
LOW Summary
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 14 | |
OS | 2 | |
OS | 2 |
Common Weakness Enumeration (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:2504
- https://access.redhat.com/errata/RHSA-2024:2504
- https://access.redhat.com/errata/RHSA-2024:3233
- https://access.redhat.com/errata/RHSA-2024:3233
- https://access.redhat.com/security/cve/CVE-2023-6918
- https://access.redhat.com/security/cve/CVE-2023-6918
- https://bugzilla.redhat.com/show_bug.cgi?id=2254997
- https://bugzilla.redhat.com/show_bug.cgi?id=2254997
- https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
- https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
- https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
- https://www.libssh.org/security/advisories/CVE-2023-6918.txt
- https://www.libssh.org/security/advisories/CVE-2023-6918.txt