CVE-2024-43410
CVSS V2 None
CVSS V3 None
Description
Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length.
After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1.
Overview
- CVE ID
- CVE-2024-43410
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-08-21T15:09:34.316Z
- Last Modified Date
- 2024-08-21T15:35:25.998Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/Eugeny/russh/security/advisories/GHSA-vgvv-x7xg-6cqg | x_refsource_CONFIRM |
https://github.com/Eugeny/russh/commit/f660ea3f64b86d11d19e33076012069f02431e55 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-43410 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43410 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-22 13:16:10 | Added to TrackCVE |