CVE Vulnerabilities

CVE-2023-1667

NULL Pointer Dereference

Published: May 26, 2023 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
LibsshLibssh0.9.1 (including)0.9.6 (including)
LibsshLibssh0.10.0 (including)0.10.4 (including)
Red Hat Enterprise Linux 8RedHatlibssh-0:0.9.6-10.el8_8*
Red Hat Enterprise Linux 8RedHatlibssh-0:0.9.6-10.el8_8*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatlibssh-0:0.9.6-4.el8_6*
Red Hat Enterprise Linux 9RedHatlibssh-0:0.10.4-11.el9*
Red Hat Enterprise Linux 9RedHatlibssh-0:0.10.4-11.el9*
LibsshUbuntubionic*
LibsshUbuntudevel*
LibsshUbuntuesm-infra/bionic*
LibsshUbuntuesm-infra/focal*
LibsshUbuntuesm-infra/xenial*
LibsshUbuntufocal*
LibsshUbuntujammy*
LibsshUbuntukinetic*
LibsshUbuntulunar*
LibsshUbuntumantic*
LibsshUbuntunoble*
LibsshUbuntuoracular*
LibsshUbuntuplucky*
LibsshUbuntutrusty*
LibsshUbuntuupstream*
LibsshUbuntuxenial*

Potential Mitigations

References