Lucene search

K
cveGitHub_MCVE-2024-43410
HistoryAug 21, 2024 - 4:15 p.m.

CVE-2024-43410

2024-08-2116:15:08
CWE-770
GitHub_M
web.nvd.nist.gov
25
russh ssh library
unauthenticated users
oom
memory allocation
security vulnerability
server.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.5%

Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length.
After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1.

Affected configurations

Vulners
Vulnrichment
Node
eugenyrusshRange<0.44.1
VendorProductVersionCPE
eugenyrussh*cpe:2.3:a:eugeny:russh:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Eugeny",
    "product": "russh",
    "versions": [
      {
        "version": "< 0.44.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.5%

Related for CVE-2024-43410