QID 379412
Date Published: 2024-02-27
QID 379412: F5 BIG-IP Advanced Firewall Manager (AFM) libssh Multiple Vulnerabilities (K000138682)
CVE-2023-2283:A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the pki_verify_data_signature function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value rc, which is initialized to SSH_ERROR and later rewritten to save the return value of the function call pki_key_check_hash_compatible. The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls goto error returning SSH_OK.
Affected Versions:
F5 BIG-IP (AFM) version 17.1.0 - 17.1.1
F5 BIG-IP (AFM) version 16.1.0 - 16.1.4
F5 BIG-IP (AFM) version 15.1.0 - 15.1.10
QID Detection Logic (Authenticated):
This QID checks for vulnerable version of F5 BIG-IP by running the 'tmsh -q show /sys version' command.
This vulnerability could allow an attacker, under certain conditions, to establish an SSH Proxy session when it should have been denied.
- K000138682 -
my.f5.com/manage/s/article/K000138682
CVEs related to QID 379412
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| K000138682 |
|