Open mend-for-github-com[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
WS-2023-0076 - High Severity Vulnerability
Vulnerable Library - src0aecda14650f9fce8577e43d2a403385b5fa5bcf
Public git conversion mirror of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.
Library home page: https://github.com/openbsd/src.git
Found in HEAD commit: 250560ac3a6cd973d828db0972dd561343848d2b
Vulnerable Source Files (2)
/lib/libskey/skeylogin.c /lib/libskey/skeylogin.c
Vulnerability Details
A stack-based buffer overflow was discovered in OpenBSD's libskey. In the file skeylogin.c, "pbuf - p" at lines 439 and 440 should be "p - pbuf", so the "pbuf - p < 4" test at line 439 always succeeds and the strncpy() at line 440 may overflow pbuf (if 2 * (p - pbuf) + 4 > 255 + 1, i.e. if the hostname is longer than 126 characters).
Publish Date: 2023-03-15
URL: WS-2023-0076
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.