CVE-2023-28113
Summary
| CVE | CVE-2023-28113 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-16 21:15:00 UTC |
| Updated | 2023-03-23 19:41:00 UTC |
| Description | russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1 |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Release v0.36.2 · warp-tech/russh · GitHub |
MISC |
github.com |
|
| Release v0.37.1 · warp-tech/russh · GitHub |
MISC |
github.com |
|
| russh/groups.rs at master · warp-tech/russh · GitHub |
MISC |
github.com |
|
| russh may use insecure Diffie-Hellman keys · Advisory · warp-tech/russh · GitHub |
CONFIRM |
github.com |
|
| GHSA-cqvm-j2r2-hwpg validate DH key range · warp-tech/russh@d831a37 · GitHub |
MISC |
github.com |
|
| russh/groups.rs at master · warp-tech/russh · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 996199 Rust (Rust) Security Update for russh (GHSA-cqvm-j2r2-hwpg)