openssh 安全漏洞 (CVE-2023-48795)

admin 2023-12-26 09:38:11 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
openssh 安全漏洞 (CVE-2023-48795)

CVE编号

CVE-2023-48795

利用情况

暂无

补丁情况

N/A

披露时间

2023-12-19
漏洞描述
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, and libssh before 0.10.6; and there could be effects on Bitvise SSH through 9.31.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://www.openwall.com/lists/oss-security/2023/12/18/3
https://access.redhat.com/security/cve/cve-2023-48795
https://bugs.gentoo.org/920280
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
https://bugzilla.suse.com/show_bug.cgi?id=1217950
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273...
https://github.com/advisories/GHSA-45x7-px36-x8w8
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/l...
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
https://github.com/libssh2/libssh2/pull/1291
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd...
https://github.com/mwiede/jsch/issues/457
https://github.com/mwiede/jsch/pull/461
https://github.com/openssh/openssh-portable/commits/master
https://github.com/paramiko/paramiko/issues/2337
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
https://github.com/ronf/asyncssh/tags
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4a...
https://github.com/warp-tech/russh/releases/tag/v0.40.2
https://gitlab.com/libssh/libssh-mirror/-/tags
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerabilit...
https://matt.ucc.asn.au/dropbear/CHANGES
https://news.ycombinator.com/item?id=38684904
https://news.ycombinator.com/item?id=38685286
https://security-tracker.debian.org/tracker/CVE-2023-48795
https://security-tracker.debian.org/tracker/source-package/libssh2
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
https://twitter.com/TrueSkrillor/status/1736774389725565005
https://ubuntu.com/security/CVE-2023-48795
https://www.bitvise.com/ssh-server-version-history
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
https://www.openssh.com/openbsd.html
https://www.openssh.com/txt/release-9.6
https://www.openwall.com/lists/oss-security/2023/12/18/2
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_c...
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka...
https://www.terrapin-attack.com
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 amazon_2 openssh * Up to (excluding) 7.4p1-22.amzn2.0.6
运行在以下环境
系统 amazon_2023 openssh * Up to (excluding) 8.7p1-8.amzn2023.0.9
运行在以下环境
系统 debian_10 dropbear * Up to (including) 2018.76-5+deb10u1
运行在以下环境
系统 debian_11 dropbear * Up to (including) 2020.81-3
运行在以下环境
系统 debian_12 dropbear * Up to (including) 2022.83-1
运行在以下环境
系统 debian_sid dropbear * Up to (including) 2022.83-3
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0