A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
References
Link | Resource |
---|---|
https://www.libssh.org/security/advisories/CVE-2020-1730.txt | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1730 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLSWHBQ3EPKGTGLQNH554Z746BJ3C554/ | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4327-1/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200424-0001/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2A7BIFKUYIYKTY7FX4BEWVC2OHS5DPOU/ | Mailing List Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2020.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-04-13 12:15
Updated : 2022-11-08 12:09
NVD link : CVE-2020-1730
Mitre link : CVE-2020-1730
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
netapp
- cloud_backup
redhat
- enterprise_linux
fedoraproject
- fedora
oracle
- mysql_workbench
canonical
- ubuntu_linux
libssh
- libssh