Bug 928323 (CVE-2015-3146) - VUL-1: CVE-2015-3146: libssh: Null pointer dereference in NEWKEYS + KEXDH_REPLY packet
Summary: VUL-1: CVE-2015-3146: libssh: Null pointer dereference in NEWKEYS + KEXDH_REP...
Status: RESOLVED FIXED
Alias: CVE-2015-3146
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:RedHat:CVE-2015-3146:5.0:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-04-23 09:24 UTC by Marcus Meissner
Modified: 2016-04-27 20:20 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 14 Lars Müller 2015-04-27 13:50:31 UTC
JFYI The update is prepared in home:lmuelle:branches:OBS_Maintained:libssh based on the code Jim offered in home:jmcdough:branches:OBS_Maintained:libssh

The project is hidden, Jim is maintainer too, and _no_ submit request got filed yet.
Comment 15 Lars Müller 2015-05-02 17:51:50 UTC
(In reply to Lars Müller from comment #14)
> JFYI The update is prepared in home:lmuelle:branches:OBS_Maintained:libssh
> based on the code Jim offered in home:jmcdough:branches:OBS_Maintained:libssh

https://build.opensuse.org/request/show/305090

I hope it's enough to set reviewer role to the security-team
Comment 16 Andreas Stieger 2015-05-03 08:45:28 UTC
Public via https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/

This is an important SECURITY and maintenance release in order to address CVE-2015-3146 – Possible double free on a dangling pointer with crafted kexinit packet.

libssh versions 0.5.1 and above have a logical error in the handling of a SSH_MSG_NEWKEYS and SSH_MSG_KEXDH_REPLY package. A detected error did not set the session into the error state correctly and further processed the packet which leads to a null pointer dereference. This is the packet after the initial key exchange and doesn’t require authentication.

This could be used for a Denial of Service (DoS) attack.

The bug was found and reported by Mariusz Ziulek from the Open Web Application Security Project (OWASP).


https://www.libssh.org/security/advisories/CVE-2014-8132.txt

===========================================================
== Subject:     CVE-2014-8132: Double free on dangling pointers in initial key exchange packet.
==
== CVE ID#:     CVE-2014-8132
==
== Versions:    All versions of libssh later than 0.5.1
==
== Summary:     A malicious initial key exchange packet could lead to a double
==              free crashing the server.
==
==              This doesn't require any authentication.
==
===========================================================

===========
Description
===========

libssh versions 0.5.1 and above could leave dangling pointers in the session
crypto structures.  It is possible to send a malicious kexinit package to
eventually cause a server to do a double-free before this fix.

This could be used for a Denial of Service attack.

As this was found by a libssh developer there are no currently known exploits
for this problem (as of December 19th 2014).

==================
Patch Availability
==================

Patches addressing the issue have been posted to:

    https://www.libssh.org/

libssh versions 0.6.4 has been released to address this issue.

==========
Workaround
==========

None.

=======
Credits
=======

This problem was found by Jon Simons. He contributed a lot of code to the
libssh project.

Patches provided by Jon Simons and the libssh Team.

==========================================================
== The libssh Team
==========================================================
Comment 17 Swamp Workflow Management 2015-05-12 15:07:51 UTC
openSUSE-SU-2015:0860-1: An update that fixes one vulnerability is now available.

Category: security (low)
Bug References: 928323
CVE References: CVE-2015-3146
Sources used:
openSUSE 13.2 (src):    libssh-0.6.3-2.7.1
openSUSE 13.1 (src):    libssh-0.5.5-2.15.1
Comment 18 Sebastian Krahmer 2015-05-13 08:08:13 UTC
Looks like RESOLVED then
Comment 19 Marcus Meissner 2015-05-13 08:21:06 UTC
(SLE updates are still in QA)
Comment 22 Marcus Meissner 2015-09-10 07:22:20 UTC
not yet released, reopen
Comment 23 Swamp Workflow Management 2015-09-10 22:00:16 UTC
bugbot adjusting priority
Comment 24 Swamp Workflow Management 2015-10-09 09:11:34 UTC
SUSE-SU-2015:1707-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 928323
CVE References: CVE-2015-3146
Sources used:
SUSE Linux Enterprise Workstation Extension 12 (src):    libssh-0.6.3-8.1
Comment 25 Marcus Meissner 2015-10-09 09:26:55 UTC
released
Comment 26 Swamp Workflow Management 2015-10-09 10:11:05 UTC
SUSE-SU-2015:1707-2: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 928323
CVE References: CVE-2015-3146
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    libssh-0.6.3-8.1
SUSE Linux Enterprise Desktop 12 (src):    libssh-0.6.3-8.1