Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3146 (GCVE-0-2015-3146)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2912-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "name": "FEDORA-2015-10962", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "name": "FEDORA-2015-7590", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "name": "DSA-3488", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3488" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-13T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2912-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "name": "FEDORA-2015-10962", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "name": "FEDORA-2015-7590", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "name": "DSA-3488", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3488" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2912-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "name": "FEDORA-2015-10962", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "name": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt", "refsource": "CONFIRM", "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "name": "FEDORA-2015-7590", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "name": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/", "refsource": "CONFIRM", "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "name": "DSA-3488", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3488" }, { "name": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f", "refsource": "CONFIRM", "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3146", "datePublished": "2016-04-13T17:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-3146\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-04-13T17:59:03.100\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.\"},{\"lang\":\"es\",\"value\":\"Los manejadores de paquete (1) SSH_MSG_NEWKEYS y (2) SSH_MSG_KEXDH_REPLY en package_cb.c en libssh en versiones anteriores a 0.6.5 no valida correctamente el estado, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda) a trav\u00e9s de un paquete SSH manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.6.4\",\"matchCriteriaId\":\"749CD4EF-4CED-4189-B70A-EFB675E5D8B4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDB5A0-0839-4A20-A003-B8CD56F48171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3488\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2912-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.libssh.org/security/advisories/CVE-2015-3146.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2912-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.libssh.org/security/advisories/CVE-2015-3146.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/476.html\\\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e\"}}" } }
cnvd-2015-02862
Vulnerability from cnvd
Title: libssh 'ssh_packet_kexdh_init()'拒绝服务漏洞
Description:
libssh是一个C函数库,用来实现SSH2协议。
libssh 0.6.5之前版本,处理SSH_MSG_NEWKEYS及SSH_MSG_KEXDH_REPLY数据包时,"ssh_packet_kexdh_init()"函数(src/server.c)出现错误,攻击者可以利用漏洞导致拒绝服务。
Severity: 中
Patch Name: libssh 'ssh_packet_kexdh_init()'拒绝服务漏洞的补丁
Patch Description:
libssh是一个C函数库,用来实现SSH2协议。
libssh 0.6.5之前版本,处理SSH_MSG_NEWKEYS及SSH_MSG_KEXDH_REPLY数据包时,"ssh_packet_kexdh_init()"函数(src/server.c)出现错误,攻击者可以利用漏洞导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下供应商提供的安全公告获得补丁信息: https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/
Reference: https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/
Name | libssh libssh < 0.6.5 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-3146" } }, "description": "libssh\u662f\u4e00\u4e2aC\u51fd\u6570\u5e93\uff0c\u7528\u6765\u5b9e\u73b0SSH2\u534f\u8bae\u3002\r\n\r\nlibssh 0.6.5\u4e4b\u524d\u7248\u672c\uff0c\u5904\u7406SSH_MSG_NEWKEYS\u53caSSH_MSG_KEXDH_REPLY\u6570\u636e\u5305\u65f6\uff0c\"ssh_packet_kexdh_init()\"\u51fd\u6570(src/server.c)\u51fa\u73b0\u9519\u8bef\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "Mariusz Ziulek", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-02862", "openTime": "2015-05-05", "patchDescription": "libssh\u662f\u4e00\u4e2aC\u51fd\u6570\u5e93\uff0c\u7528\u6765\u5b9e\u73b0SSH2\u534f\u8bae\u3002 \r\n\r\nlibssh 0.6.5\u4e4b\u524d\u7248\u672c\uff0c\u5904\u7406SSH_MSG_NEWKEYS\u53caSSH_MSG_KEXDH_REPLY\u6570\u636e\u5305\u65f6\uff0c\"ssh_packet_kexdh_init()\"\u51fd\u6570(src/server.c)\u51fa\u73b0\u9519\u8bef\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "libssh \u0027ssh_packet_kexdh_init()\u0027\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "libssh libssh \u003c 0.6.5" }, "referenceLink": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/", "serverity": "\u4e2d", "submitTime": "2015-05-04", "title": "libssh \u0027ssh_packet_kexdh_init()\u0027\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
fkie_cve-2015-3146
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
libssh | libssh | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "749CD4EF-4CED-4189-B70A-EFB675E5D8B4", "versionEndIncluding": "0.6.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet." }, { "lang": "es", "value": "Los manejadores de paquete (1) SSH_MSG_NEWKEYS y (2) SSH_MSG_KEXDH_REPLY en package_cb.c en libssh en versiones anteriores a 0.6.5 no valida correctamente el estado, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda) a trav\u00e9s de un paquete SSH manipulado." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2015-3146", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-13T17:59:03.100", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2016/dsa-3488" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "source": "secalert@redhat.com", "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2015:1707-2
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for libssh", "title": "Title of the patch" }, { "category": "description", "text": "The encryption library libssh was updated to fix one security issue.\n\nThe following vulnerability was fixed:\n\n* CVE-2015-3146: Unauthenticated remote attackers could crash the server or client with specially crafted packages.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-660,SUSE-SLE-SDK-12-2015-660", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1707-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1707-2", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151707-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1707-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001624.html" }, { "category": "self", "summary": "SUSE Bug 928323", "url": "https://bugzilla.suse.com/928323" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3146 page", "url": "https://www.suse.com/security/cve/CVE-2015-3146/" } ], "title": "Security update for libssh", "tracking": { "current_release_date": "2015-10-01T08:51:46Z", "generator": { "date": "2015-10-01T08:51:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1707-2", "initial_release_date": "2015-10-01T08:51:46Z", "revision_history": [ { "date": "2015-10-01T08:51:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libssh-devel-0.6.3-8.1.ppc64le", "product": { "name": "libssh-devel-0.6.3-8.1.ppc64le", "product_id": "libssh-devel-0.6.3-8.1.ppc64le" } }, { "category": "product_version", "name": "libssh-devel-doc-0.6.3-8.1.ppc64le", "product": { "name": "libssh-devel-doc-0.6.3-8.1.ppc64le", "product_id": "libssh-devel-doc-0.6.3-8.1.ppc64le" } }, { "category": "product_version", "name": "libssh4-0.6.3-8.1.ppc64le", "product": { "name": "libssh4-0.6.3-8.1.ppc64le", "product_id": "libssh4-0.6.3-8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libssh-devel-0.6.3-8.1.s390x", "product": { "name": "libssh-devel-0.6.3-8.1.s390x", "product_id": "libssh-devel-0.6.3-8.1.s390x" } }, { "category": "product_version", "name": "libssh-devel-doc-0.6.3-8.1.s390x", "product": { "name": "libssh-devel-doc-0.6.3-8.1.s390x", "product_id": "libssh-devel-doc-0.6.3-8.1.s390x" } }, { "category": "product_version", "name": "libssh4-0.6.3-8.1.s390x", "product": { "name": "libssh4-0.6.3-8.1.s390x", "product_id": "libssh4-0.6.3-8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libssh4-0.6.3-8.1.x86_64", "product": { "name": "libssh4-0.6.3-8.1.x86_64", "product_id": "libssh4-0.6.3-8.1.x86_64" } }, { "category": "product_version", "name": "libssh-devel-0.6.3-8.1.x86_64", "product": { "name": "libssh-devel-0.6.3-8.1.x86_64", "product_id": "libssh-devel-0.6.3-8.1.x86_64" } }, { "category": "product_version", "name": "libssh-devel-doc-0.6.3-8.1.x86_64", "product": { "name": "libssh-devel-doc-0.6.3-8.1.x86_64", "product_id": "libssh-devel-doc-0.6.3-8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.6.3-8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:libssh4-0.6.3-8.1.x86_64" }, "product_reference": "libssh4-0.6.3-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.6.3-8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.ppc64le" }, "product_reference": "libssh-devel-0.6.3-8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.6.3-8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.s390x" }, "product_reference": "libssh-devel-0.6.3-8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.6.3-8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.x86_64" }, "product_reference": "libssh-devel-0.6.3-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.6.3-8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.ppc64le" }, "product_reference": "libssh-devel-doc-0.6.3-8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.6.3-8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.s390x" }, "product_reference": "libssh-devel-doc-0.6.3-8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.6.3-8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.x86_64" }, "product_reference": "libssh-devel-doc-0.6.3-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.6.3-8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.ppc64le" }, "product_reference": "libssh4-0.6.3-8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.6.3-8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.s390x" }, "product_reference": "libssh4-0.6.3-8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.6.3-8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.x86_64" }, "product_reference": "libssh4-0.6.3-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3146" } ], "notes": [ { "category": "general", "text": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:libssh4-0.6.3-8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3146", "url": "https://www.suse.com/security/cve/CVE-2015-3146" }, { "category": "external", "summary": "SUSE Bug 928323 for CVE-2015-3146", "url": "https://bugzilla.suse.com/928323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:libssh4-0.6.3-8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-0.6.3-8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libssh-devel-doc-0.6.3-8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libssh4-0.6.3-8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-01T08:51:46Z", "details": "moderate" } ], "title": "CVE-2015-3146" } ] }
suse-su-2015:1707-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for libssh", "title": "Title of the patch" }, { "category": "description", "text": "The encryption library libssh was updated to fix one security issue.\n\nThe following vulnerability was fixed:\n\n* CVE-2015-3146: Unauthenticated remote attackers could crash the server or client with specially crafted packages.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-WE-12-2015-660", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1707-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1707-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151707-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1707-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001621.html" }, { "category": "self", "summary": "SUSE Bug 928323", "url": "https://bugzilla.suse.com/928323" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3146 page", "url": "https://www.suse.com/security/cve/CVE-2015-3146/" } ], "title": "Security update for libssh", "tracking": { "current_release_date": "2015-10-01T08:51:47Z", "generator": { "date": "2015-10-01T08:51:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1707-1", "initial_release_date": "2015-10-01T08:51:47Z", "revision_history": [ { "date": "2015-10-01T08:51:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libssh4-0.6.3-8.1.x86_64", "product": { "name": "libssh4-0.6.3-8.1.x86_64", "product_id": "libssh4-0.6.3-8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.6.3-8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:libssh4-0.6.3-8.1.x86_64" }, "product_reference": "libssh4-0.6.3-8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3146" } ], "notes": [ { "category": "general", "text": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Workstation Extension 12:libssh4-0.6.3-8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3146", "url": "https://www.suse.com/security/cve/CVE-2015-3146" }, { "category": "external", "summary": "SUSE Bug 928323 for CVE-2015-3146", "url": "https://bugzilla.suse.com/928323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Workstation Extension 12:libssh4-0.6.3-8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-10-01T08:51:47Z", "details": "moderate" } ], "title": "CVE-2015-3146" } ] }
WID-SEC-W-2024-1054
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "libssh ist eine C Bibliothek f\u00fcr das Anbieten von SSH Diensten auf Client- und Serverseite. Sie kann genutzt werden, um aus der Ferne Programme auszuf\u00fchren, Dateien zu \u00fcbertragen oder als sicherer und transparenter Tunnel f\u00fcr entfernte Programme genutzt werden.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libssh und Ubuntu Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Sicherheitsmechanismen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1054 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-1054.json" }, { "category": "self", "summary": "WID-SEC-2024-1054 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1054" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2912-1 vom 2016-02-23", "url": "http://www.ubuntu.com/usn/usn-2912-1" }, { "category": "external", "summary": "Security and Bugfix Release libssh 0.7.3 vom 2016-02-23", "url": "https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/" }, { "category": "external", "summary": "Red Hat Bugzilla Bug 1305971 vom 2016-02-24", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0739" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0622-1 vom 2016-03-01", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160622-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0625-1 vom 2016-03-02", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160625-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0566-1 vom 2016-04-01", "url": "https://rhn.redhat.com/errata/RHSA-2016-0566.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08", "url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=" } ], "source_lang": "en-US", "title": "libssh: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:37.423+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1054", "initial_release_date": "2016-02-23T23:00:00.000+00:00", "revision_history": [ { "date": "2016-02-23T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-02-23T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-03-01T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-03-02T23:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2016-03-02T23:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-04-03T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-04-03T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "virtual", "product": { "name": "Dell NetWorker virtual", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c0.7.3", "product": { "name": "Open Source libssh \u003c0.7.3", "product_id": "T007093" } } ], "category": "product_name", "name": "libssh" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "T003855", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12" } } }, { "category": "product_version", "name": "12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "T006804", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1" } } } ], "category": "product_name", "name": "Linux Enterprise Desktop" } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12.04 LTS", "product": { "name": "Ubuntu Linux 12.04 LTS", "product_id": "307702", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~" } } }, { "category": "product_version", "name": "14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "308878", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~" } } }, { "category": "product_version", "name": "15.1", "product": { "name": "Ubuntu Linux 15.10", "product_id": "316506", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:15.10" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3146", "notes": [ { "category": "description", "text": "Es existiert eine Denial of Service Schwachstelle in libssh. Diese Schwachstelle beruht auf einem logischen Fehler bei der Verarbeitung von SSH_MSG_NEWKEYS und SSH_MSG_KEXDH_REPLY Paketen. In der Folge kann ein entfernter anonymer Angreifer diese Schwachstelle mittels \u00dcbermittlung speziell gestalteter Pakete ausnutzen, um eine NULL Pointer Dereferenzierung auszul\u00f6sen bzw. einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "316506", "T014381", "T034583", "T003855", "307702", "308878", "T006804" ] }, "release_date": "2016-02-23T23:00:00.000+00:00", "title": "CVE-2015-3146" }, { "cve": "CVE-2016-0739", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in libssh im Zusammenhang mit einer Bit/Byte Verwechslung. Diese Schwachstelle beruht in den Funktionen \"ssh_crypto_finalize\" und \"ssh_dh_generate_x\" in [/src/dh.c] und wird durch die Art und Weise verursacht, wie libssh Ephemeral Secrets f\u00fcr die Schl\u00fcsselaustausch-Methoden \"Diffie Hellman Gruppe 1\" und \"Diffie Hellman Gruppe 15\" erzeugt. In der Folge ist dadurch die Sicherheit des Diffie Hellmann Schl\u00fcsselaustausch geschw\u00e4cht, da nur Geheimnisse von 128 bzw. 256 Zufallsbits verwendet werden anstelle von 1024 bzw. 2048 bits. Somit kann ein entfernter anonymer Angreifer, welcher gen\u00fcgend Ressourcen besitzt, diese Schwachstelle dazu ausnutzen, um SSH Sessions zu entschl\u00fcsseln oder abzuh\u00f6ren." } ], "product_status": { "known_affected": [ "316506", "T014381", "67646", "T034583", "T003855", "307702", "308878", "T006804" ] }, "release_date": "2016-02-23T23:00:00.000+00:00", "title": "CVE-2016-0739" } ] }
wid-sec-w-2024-1054
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "libssh ist eine C Bibliothek f\u00fcr das Anbieten von SSH Diensten auf Client- und Serverseite. Sie kann genutzt werden, um aus der Ferne Programme auszuf\u00fchren, Dateien zu \u00fcbertragen oder als sicherer und transparenter Tunnel f\u00fcr entfernte Programme genutzt werden.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libssh und Ubuntu Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Sicherheitsmechanismen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1054 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-1054.json" }, { "category": "self", "summary": "WID-SEC-2024-1054 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1054" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2912-1 vom 2016-02-23", "url": "http://www.ubuntu.com/usn/usn-2912-1" }, { "category": "external", "summary": "Security and Bugfix Release libssh 0.7.3 vom 2016-02-23", "url": "https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/" }, { "category": "external", "summary": "Red Hat Bugzilla Bug 1305971 vom 2016-02-24", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0739" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0622-1 vom 2016-03-01", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160622-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0625-1 vom 2016-03-02", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160625-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0566-1 vom 2016-04-01", "url": "https://rhn.redhat.com/errata/RHSA-2016-0566.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08", "url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=" } ], "source_lang": "en-US", "title": "libssh: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:37.423+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1054", "initial_release_date": "2016-02-23T23:00:00.000+00:00", "revision_history": [ { "date": "2016-02-23T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-02-23T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-03-01T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-03-02T23:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2016-03-02T23:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-04-03T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-04-03T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "virtual", "product": { "name": "Dell NetWorker virtual", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c0.7.3", "product": { "name": "Open Source libssh \u003c0.7.3", "product_id": "T007093" } } ], "category": "product_name", "name": "libssh" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "T003855", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12" } } }, { "category": "product_version", "name": "12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "T006804", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1" } } } ], "category": "product_name", "name": "Linux Enterprise Desktop" } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12.04 LTS", "product": { "name": "Ubuntu Linux 12.04 LTS", "product_id": "307702", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~" } } }, { "category": "product_version", "name": "14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "308878", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~" } } }, { "category": "product_version", "name": "15.1", "product": { "name": "Ubuntu Linux 15.10", "product_id": "316506", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:15.10" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3146", "notes": [ { "category": "description", "text": "Es existiert eine Denial of Service Schwachstelle in libssh. Diese Schwachstelle beruht auf einem logischen Fehler bei der Verarbeitung von SSH_MSG_NEWKEYS und SSH_MSG_KEXDH_REPLY Paketen. In der Folge kann ein entfernter anonymer Angreifer diese Schwachstelle mittels \u00dcbermittlung speziell gestalteter Pakete ausnutzen, um eine NULL Pointer Dereferenzierung auszul\u00f6sen bzw. einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "316506", "T014381", "T034583", "T003855", "307702", "308878", "T006804" ] }, "release_date": "2016-02-23T23:00:00.000+00:00", "title": "CVE-2015-3146" }, { "cve": "CVE-2016-0739", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in libssh im Zusammenhang mit einer Bit/Byte Verwechslung. Diese Schwachstelle beruht in den Funktionen \"ssh_crypto_finalize\" und \"ssh_dh_generate_x\" in [/src/dh.c] und wird durch die Art und Weise verursacht, wie libssh Ephemeral Secrets f\u00fcr die Schl\u00fcsselaustausch-Methoden \"Diffie Hellman Gruppe 1\" und \"Diffie Hellman Gruppe 15\" erzeugt. In der Folge ist dadurch die Sicherheit des Diffie Hellmann Schl\u00fcsselaustausch geschw\u00e4cht, da nur Geheimnisse von 128 bzw. 256 Zufallsbits verwendet werden anstelle von 1024 bzw. 2048 bits. Somit kann ein entfernter anonymer Angreifer, welcher gen\u00fcgend Ressourcen besitzt, diese Schwachstelle dazu ausnutzen, um SSH Sessions zu entschl\u00fcsseln oder abzuh\u00f6ren." } ], "product_status": { "known_affected": [ "316506", "T014381", "67646", "T034583", "T003855", "307702", "308878", "T006804" ] }, "release_date": "2016-02-23T23:00:00.000+00:00", "title": "CVE-2016-0739" } ] }
opensuse-su-2024:10036-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libssh-devel-0.7.2-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libssh-devel-0.7.2-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10036", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10036-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2012-4559 page", "url": "https://www.suse.com/security/cve/CVE-2012-4559/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-4560 page", "url": "https://www.suse.com/security/cve/CVE-2012-4560/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-4561 page", "url": "https://www.suse.com/security/cve/CVE-2012-4561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0176 page", "url": "https://www.suse.com/security/cve/CVE-2013-0176/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0017 page", "url": "https://www.suse.com/security/cve/CVE-2014-0017/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8132 page", "url": "https://www.suse.com/security/cve/CVE-2014-8132/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3146 page", "url": "https://www.suse.com/security/cve/CVE-2015-3146/" } ], "title": "libssh-devel-0.7.2-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10036-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libssh-devel-0.7.2-2.1.aarch64", "product": { "name": "libssh-devel-0.7.2-2.1.aarch64", "product_id": "libssh-devel-0.7.2-2.1.aarch64" } }, { "category": "product_version", "name": "libssh-devel-doc-0.7.2-2.1.aarch64", "product": { "name": "libssh-devel-doc-0.7.2-2.1.aarch64", "product_id": "libssh-devel-doc-0.7.2-2.1.aarch64" } }, { "category": "product_version", "name": "libssh4-0.7.2-2.1.aarch64", "product": { "name": "libssh4-0.7.2-2.1.aarch64", "product_id": "libssh4-0.7.2-2.1.aarch64" } }, { "category": "product_version", "name": "libssh4-32bit-0.7.2-2.1.aarch64", "product": { "name": "libssh4-32bit-0.7.2-2.1.aarch64", "product_id": "libssh4-32bit-0.7.2-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libssh-devel-0.7.2-2.1.ppc64le", "product": { "name": "libssh-devel-0.7.2-2.1.ppc64le", "product_id": "libssh-devel-0.7.2-2.1.ppc64le" } }, { "category": "product_version", "name": "libssh-devel-doc-0.7.2-2.1.ppc64le", "product": { "name": "libssh-devel-doc-0.7.2-2.1.ppc64le", "product_id": "libssh-devel-doc-0.7.2-2.1.ppc64le" } }, { "category": "product_version", "name": "libssh4-0.7.2-2.1.ppc64le", "product": { "name": "libssh4-0.7.2-2.1.ppc64le", "product_id": "libssh4-0.7.2-2.1.ppc64le" } }, { "category": "product_version", "name": "libssh4-32bit-0.7.2-2.1.ppc64le", "product": { "name": "libssh4-32bit-0.7.2-2.1.ppc64le", "product_id": "libssh4-32bit-0.7.2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libssh-devel-0.7.2-2.1.s390x", "product": { "name": "libssh-devel-0.7.2-2.1.s390x", "product_id": "libssh-devel-0.7.2-2.1.s390x" } }, { "category": "product_version", "name": "libssh-devel-doc-0.7.2-2.1.s390x", "product": { "name": "libssh-devel-doc-0.7.2-2.1.s390x", "product_id": "libssh-devel-doc-0.7.2-2.1.s390x" } }, { "category": "product_version", "name": "libssh4-0.7.2-2.1.s390x", "product": { "name": "libssh4-0.7.2-2.1.s390x", "product_id": "libssh4-0.7.2-2.1.s390x" } }, { "category": "product_version", "name": "libssh4-32bit-0.7.2-2.1.s390x", "product": { "name": "libssh4-32bit-0.7.2-2.1.s390x", "product_id": "libssh4-32bit-0.7.2-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libssh-devel-0.7.2-2.1.x86_64", "product": { "name": "libssh-devel-0.7.2-2.1.x86_64", "product_id": "libssh-devel-0.7.2-2.1.x86_64" } }, { "category": "product_version", "name": "libssh-devel-doc-0.7.2-2.1.x86_64", "product": { "name": "libssh-devel-doc-0.7.2-2.1.x86_64", "product_id": "libssh-devel-doc-0.7.2-2.1.x86_64" } }, { "category": "product_version", "name": "libssh4-0.7.2-2.1.x86_64", "product": { "name": "libssh4-0.7.2-2.1.x86_64", "product_id": "libssh4-0.7.2-2.1.x86_64" } }, { "category": "product_version", "name": "libssh4-32bit-0.7.2-2.1.x86_64", "product": { "name": "libssh4-32bit-0.7.2-2.1.x86_64", "product_id": "libssh4-32bit-0.7.2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.7.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64" }, "product_reference": "libssh-devel-0.7.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.7.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le" }, "product_reference": "libssh-devel-0.7.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.7.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x" }, "product_reference": "libssh-devel-0.7.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-0.7.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64" }, "product_reference": "libssh-devel-0.7.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.7.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64" }, "product_reference": "libssh-devel-doc-0.7.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.7.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le" }, "product_reference": "libssh-devel-doc-0.7.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.7.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x" }, "product_reference": "libssh-devel-doc-0.7.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh-devel-doc-0.7.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64" }, "product_reference": "libssh-devel-doc-0.7.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.7.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64" }, "product_reference": "libssh4-0.7.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.7.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le" }, "product_reference": "libssh4-0.7.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.7.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x" }, "product_reference": "libssh4-0.7.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-0.7.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64" }, "product_reference": "libssh4-0.7.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-32bit-0.7.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64" }, "product_reference": "libssh4-32bit-0.7.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-32bit-0.7.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le" }, "product_reference": "libssh4-32bit-0.7.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-32bit-0.7.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x" }, "product_reference": "libssh4-32bit-0.7.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libssh4-32bit-0.7.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" }, "product_reference": "libssh4-32bit-0.7.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-4559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-4559" } ], "notes": [ { "category": "general", "text": "Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-4559", "url": "https://www.suse.com/security/cve/CVE-2012-4559" }, { "category": "external", "summary": "SUSE Bug 789827 for CVE-2012-4559", "url": "https://bugzilla.suse.com/789827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-4559" }, { "cve": "CVE-2012-4560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-4560" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-4560", "url": "https://www.suse.com/security/cve/CVE-2012-4560" }, { "category": "external", "summary": "SUSE Bug 789827 for CVE-2012-4560", "url": "https://bugzilla.suse.com/789827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-4560" }, { "cve": "CVE-2012-4561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-4561" } ], "notes": [ { "category": "general", "text": "The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free \"an invalid pointer on an error path,\" which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-4561", "url": "https://www.suse.com/security/cve/CVE-2012-4561" }, { "category": "external", "summary": "SUSE Bug 789827 for CVE-2012-4561", "url": "https://bugzilla.suse.com/789827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-4561" }, { "cve": "CVE-2013-0176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0176" } ], "notes": [ { "category": "general", "text": "The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a \"Client: Diffie-Hellman Key Exchange Init\" packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0176", "url": "https://www.suse.com/security/cve/CVE-2013-0176" }, { "category": "external", "summary": "SUSE Bug 802631 for CVE-2013-0176", "url": "https://bugzilla.suse.com/802631" }, { "category": "external", "summary": "SUSE Bug 928323 for CVE-2013-0176", "url": "https://bugzilla.suse.com/928323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0176" }, { "cve": "CVE-2014-0017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0017" } ], "notes": [ { "category": "general", "text": "The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0017", "url": "https://www.suse.com/security/cve/CVE-2014-0017" }, { "category": "external", "summary": "SUSE Bug 866278 for CVE-2014-0017", "url": "https://bugzilla.suse.com/866278" }, { "category": "external", "summary": "SUSE Bug 866286 for CVE-2014-0017", "url": "https://bugzilla.suse.com/866286" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-0017" }, { "cve": "CVE-2014-8132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8132" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8132", "url": "https://www.suse.com/security/cve/CVE-2014-8132" }, { "category": "external", "summary": "SUSE Bug 910790 for CVE-2014-8132", "url": "https://bugzilla.suse.com/910790" }, { "category": "external", "summary": "SUSE Bug 928323 for CVE-2014-8132", "url": "https://bugzilla.suse.com/928323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-8132" }, { "cve": "CVE-2015-3146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3146" } ], "notes": [ { "category": "general", "text": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3146", "url": "https://www.suse.com/security/cve/CVE-2015-3146" }, { "category": "external", "summary": "SUSE Bug 928323 for CVE-2015-3146", "url": "https://bugzilla.suse.com/928323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh-devel-doc-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-0.7.2-2.1.x86_64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.aarch64", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.ppc64le", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.s390x", "openSUSE Tumbleweed:libssh4-32bit-0.7.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-3146" } ] }
ghsa-46jx-xcg7-prj7
Vulnerability from github
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
{ "affected": [], "aliases": [ "CVE-2015-3146" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-04-13T17:59:00Z", "severity": "HIGH" }, "details": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.", "id": "GHSA-46jx-xcg7-prj7", "modified": "2025-04-12T12:58:38Z", "published": "2022-05-17T03:56:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3146" }, { "type": "WEB", "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" }, { "type": "WEB", "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release" }, { "type": "WEB", "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3488" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2912-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2015-3146
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-3146", "description": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.", "id": "GSD-2015-3146", "references": [ "https://www.suse.com/security/cve/CVE-2015-3146.html", "https://ubuntu.com/security/CVE-2015-3146", "https://advisories.mageia.org/CVE-2015-3146.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-3146" ], "details": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.", "id": "GSD-2015-3146", "modified": "2023-12-13T01:20:07.890343Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2912-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "name": "FEDORA-2015-10962", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "name": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt", "refsource": "CONFIRM", "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "name": "FEDORA-2015-7590", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "name": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/", "refsource": "CONFIRM", "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "name": "DSA-3488", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3488" }, { "name": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f", "refsource": "CONFIRM", "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.6.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3146" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-7590", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html" }, { "name": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.libssh.org/security/advisories/CVE-2015-3146.txt" }, { "name": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/" }, { "name": "USN-2912-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2912-1" }, { "name": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f", "refsource": "CONFIRM", "tags": [], "url": "https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5\u0026id=94f6955fbaee6fda9385a23e505497efe21f5b4f" }, { "name": "FEDORA-2015-10962", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html" }, { "name": "DSA-3488", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2016/dsa-3488" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM" }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2016-04-20T15:07Z", "publishedDate": "2016-04-13T17:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.