CVE-2023-28113

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28113
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28113.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28113
Aliases
Withdrawn
2024-07-18T01:38:09.338487Z
Published
2023-03-16T21:15:13Z
Modified
2024-05-14T11:38:41.779035Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1

References

Affected packages

Git / github.com/warp-tech/russh

Affected ranges

Type
GIT
Repo
https://github.com/warp-tech/russh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.34.0
v0.35.0-beta.1
v0.35.0-beta.2
v0.35.0-beta.3
v0.35.0-beta.5
v0.35.0-beta.6
v0.35.0-beta.7
v0.35.0-beta.8
v0.35.0-beta.9
v0.36.0
v0.36.1