A flaw was found in libssh. The API function ssh_get_hexa() is vulnerable to a denial of service when processing zero-length input. This can be exploited remotely by an attacker during GSSAPI (Generic Security Service Application Program Interface) authentication if the server's logging verbosity is set to SSH_LOG_PACKET (3) or higher. Successful exploitation could lead to a self-Denial of Service of the per-connection daemon process.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "0.6.3-4.3ubuntu0.6+esm4",
"binary_name": "libssh-4"
},
{
"binary_version": "0.6.3-4.3ubuntu0.6+esm4",
"binary_name": "libssh-gcrypt-4"
}
],
"priority_reason": "Low severity DoS issue"
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.7+esm6",
"binary_name": "libssh-4"
},
{
"binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.7+esm6",
"binary_name": "libssh-gcrypt-4"
}
],
"priority_reason": "Low severity DoS issue"
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "0.9.3-2ubuntu2.5+esm3",
"binary_name": "libssh-4"
},
{
"binary_version": "0.9.3-2ubuntu2.5+esm3",
"binary_name": "libssh-gcrypt-4"
}
],
"priority_reason": "Low severity DoS issue"
}