CVE-2015-3146NULL Pointer Dereference in Libssh

Severity
7.5HIGHNVD
EPSS
2.8%
top 13.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 13
Latest updateMay 17

Description

The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debianlibssh/libssh< 0.6.3-4.2+3
Ubuntulibssh/libssh< 0.6.1-0ubuntu3.3
NVDlibssh/libssh0.6.4

Also affects: Debian Linux 7.0, 8.0, Fedora 21, 22, Ubuntu Linux 12.04, 14.04, 15.10

🔴Vulnerability Details

4
GHSA
GHSA-46jx-xcg7-prj7: The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb2022-05-17
OSV
CVE-2015-3146: The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb2016-04-13
CVEList
CVE-2015-3146: The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb2016-04-13
OSV
libssh vulnerabilities2016-02-23

📋Vendor Advisories

3
Ubuntu
libssh vulnerabilities2016-02-23
Red Hat
libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets2015-04-30
Debian
CVE-2015-3146: libssh - The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_c...2015

💬Community

3
Bugzilla
CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets [fedora-all]2015-05-04
Bugzilla
CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets [epel-all]2015-05-04
Bugzilla
CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets2015-04-21