CVE-2021-3634 (CNNVD-202108-2375)

MEDIUM
中文标题:
Libssh 缓冲区错误漏洞
英文标题:
A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shar...
CVSS分数: 6.5
发布时间: 2021-08-31 00:00:00
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Libssh是Libssh组织的一个用于访问SSH服务的C语言开发包,它能够执行远程命令、文件传输,同时为远程的程序提供安全的传输通道。 libssh 存在缓冲区错误漏洞,该漏洞源于 libssh 允许在密钥重新交换操作中改变密钥交换方法。改变密钥交换方法时,如果采用不同长度的 hash ,将会导致缓冲区错误。

英文描述:

A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.

CWE类型:
CWE-787
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
libssh libssh * - - cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
redhat virtualization 4.0 - - cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
redhat enterprise_linux 8.0 - - cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debian debian_linux 11.0 - - cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
fedoraproject fedora 33 - - cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
fedoraproject fedora 34 - - cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
fedoraproject fedora 35 - - cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
oracle mysql_workbench * - - cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
netapp cloud_backup - - - cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
DSA-4965 vendor-advisory
cve.org
访问
FEDORA-2021-ec797b6a96 vendor-advisory
cve.org
访问
FEDORA-2021-288925ac19 vendor-advisory
cve.org
访问
FEDORA-2021-f2a020a065 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
GLSA-202312-05 vendor-advisory
cve.org
访问
CVSS评分详情
6.5
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2021-08-31 00:00:00
修改时间:
2024-08-03 17:01:07
创建时间:
2025-11-11 15:36:57
更新时间:
2025-11-11 15:56:52
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2021-3634 2025-11-11 15:21:05 2025-11-11 07:36:57
NVD nvd_CVE-2021-3634 2025-11-11 14:57:41 2025-11-11 07:45:15
CNNVD cnnvd_CNNVD-202108-2375 2025-11-11 15:10:42 2025-11-11 07:56:52
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:56:52
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-202108-2375; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-202108-2375
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:15
cvss_score: 未提取 → 6.5; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 10; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 6.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 0 -> 10
  • data_sources: ['cve'] -> ['cve', 'nvd']