Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-43410
HistoryAug 21, 2024 - 3:09 p.m.

CVE-2024-43410 Russh has an OOM Denial of Service due to allocation of untrusted amount

2024-08-2115:09:34
CWE-770
GitHub_M
github.com
2
cve-2024
russh
oom denial of service
untrusted memory allocation
ssh packet
4-byte length
memory allocation vulnerability
0.44.1 fix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.5%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length.
After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*"
    ],
    "vendor": "russh_project",
    "product": "russh",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0.44.1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.5%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-43410