SB2012120719 - Slackware Linux update for libssh
Published: December 7, 2012 Updated: May 6, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2012-4559)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
2) Buffer overflow (CVE-ID: CVE-2012-4560)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
3) Input validation error (CVE-ID: CVE-2012-4561)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.
4) Input validation error (CVE-ID: CVE-2012-4562)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified vulnerabilities.
Remediation
Install update from vendor's website.