FreeBSD : libssh -- NULL pointer dereference (0b040e24-f751-11e4-b24d-5453ed2e2b49)

high Nessus Plugin ID 83328

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Andreas Schneider reports :

libssh versions 0.5.1 and above have a logical error in the handling of a SSH_MSG_NEWKEYS and SSH_MSG_KEXDH_REPLY package. A detected error did not set the session into the error state correctly and further processed the packet which leads to a NULL pointer dereference. This is the packet after the initial key exchange and doesn't require authentication.

This could be used for a Denial of Service (DoS) attack.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?ad48287a

http://www.nessus.org/u?e4cf8fa6

Plugin Details

Severity: High

ID: 83328

File Name: freebsd_pkg_0b040e24f75111e4b24d5453ed2e2b49.nasl

Version: 2.7

Type: local

Published: 5/11/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libssh, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/10/2015

Vulnerability Publication Date: 4/30/2015

Reference Information

CVE: CVE-2015-3146