GHSA-2326-hx7g-3m9r

Suggest an improvement
Source
https://github.com/advisories/GHSA-2326-hx7g-3m9r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-2326-hx7g-3m9r/GHSA-2326-hx7g-3m9r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2326-hx7g-3m9r
Aliases
Published
2024-08-12T18:30:47Z
Modified
2024-08-12T20:12:02.522950Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Apache MINA SSHD: integrity check bypass
Details

Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack

The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.

Database specific
{
    "nvd_published_at": "2024-08-12T16:15:15Z",
    "cwe_ids": [
        "CWE-354"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-08-12T19:52:15Z"
}
References

Affected packages

Maven / org.apache.sshd:sshd-common

Package

Name
org.apache.sshd:sshd-common
View open source insights on deps.dev
Purl
pkg:maven/org.apache.sshd/sshd-common

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.12.0

Affected versions

2.*

2.1.0
2.2.0
2.3.0
2.4.0
2.5.0
2.5.1
2.6.0
2.7.0
2.8.0
2.9.0
2.9.1
2.9.2
2.9.3
2.10.0
2.11.0