漏洞标题
Erlang OTP中SSH SFTP数据包大小验证不当漏洞
漏洞描述信息
Erlang 是一种编程语言和运行时系统,适用于构建大规模可扩展的软实时系统,这些系统对高可用性有要求。OTP 是一组 Erlang 库,包括 Erlang 运行时系统和许多主要用 Erlang 编写的现成组件。对于 SFTP 数据包,数据包大小未得到正确验证。因此,当 ssh 收到多个符合最大 SSH 数据包大小的 SSH 数据包时,它们可能会被组合成一个 SFTP 数据包,该 SFTP 数据包将超过允许的最大数据包大小,并可能导致大量内存被分配。需要注意的是,上述情况仅会在完成 SSH 握手后成功认证的用户中发生。此问题已在 OTP 版本 27.2.4、26.2.5.9 和 25.3.2.18 中修复。此漏洞尚无已知的解决方法。
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
不加限制或调节的资源分配
漏洞标题
SSH SFTP packet size not verified properly in Erlang OTP
漏洞描述信息
Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability.
CVSS信息
N/A
漏洞类别
未经控制的内存分配