CVE-2023-3603
CVSS V2 None
CVSS V3 None
Description
A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users.
Given this code is not in any released versions, no security releases have been issued.
Overview
- CVE ID
- CVE-2023-3603
- Assigner
- redhat
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-07-21T19:09:44.083Z
- Last Modified Date
- 2024-01-23T00:58:36.996Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-3603 | vdb-entry x_refsource_REDHAT |
https://bugzilla.redhat.com/show_bug.cgi?id=2221791 | issue-tracking x_refsource_REDHAT |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-3603 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3603 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 21:17:00 | Added to TrackCVE |