Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2023-48795

Published: December 18, 2023Last modified: July 9, 2024

Description

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, and golang.org/x/crypto before 0.17.0; and there could be effects on Bitvise SSH through 9.31 and libssh through 0.10.5.

Severity score breakdown

ParameterValue
Base score5.9
Attack VectorNETWORK
Attack complexityHIGH
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactHIGH
Availability impactNONE
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSbuildahFixed (1.28.2-r6)
libsshFixed (0.10.6-r0)
libssh2Fixed (1.11.0-r0)
opensshFixed (9.1_p1-r7)
podmanFixed (4.3.1-r5)
StreambuildahFixed (1.34.0-r1)
libsshFixed (0.10.6-r0)
libssh2Fixed (1.11.0-r1)
opensshFixed (9.6_p1-r0)
podmanFixed (4.8.2-r1)

References

Published BELL-SAs

ON THIS PAGE