3 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

21 Aug 2024 — Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length. After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memor... • https://github.com/Eugeny/russh/security/advisories/GHSA-vgvv-x7xg-6cqg • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.9EPSS: 67%CPEs: 79EXPL: 3

18 Dec 2023 — The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phas... • https://packetstorm.news/files/id/176280 • CWE-222: Truncation of Security-relevant Information CWE-354: Improper Validation of Integrity Check Value •

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 1

16 Mar 2023 — russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in ... • https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L72-L76 • CWE-20: Improper Input Validation CWE-347: Improper Verification of Cryptographic Signature CWE-358: Improperly Implemented Security Check for Standard •