SSH server due to Improper Signature Verification
High
S
Sifchain
Submitted None
Actions:
Reported by
escanor56
Vulnerability Details
Technical details and impact analysis
I found that you are using golang.org/x/[email protected] which has a vulnerability that was fixed in this version
golang.org/x/[email protected] but that vulnerability is:
golang.org/x/crypto/ssh is an SSH client and server
Version v0.0.0-20200220183623-bac4c82f6975 of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed peers to cause a panic in SSH servers that accept public keys and in any SSH client.
You can check all of the info here with this CVE: CVE-2020-9283.
## Impact
An attacker can craft an ssh-ed25519 or [email protected] public key, such that the library will panic when trying to verify a signature with it. Clients can deliver such a public key and signature to any golang.org/x/crypto/ssh server with a PublicKeyCallback, and servers can deliver them to any golang.org/x/crypto/ssh client.
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2020-9283
UNKNOWN
golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.
Report Details
Additional information and metadata
State
Closed
Substate
Not-Applicable