A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2023-3603 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2221791 Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2023-07-21T19:09:44.083Z

Updated: 2024-01-23T00:58:36.996Z

Reserved: 2023-07-10T18:21:21.431Z


Link: CVE-2023-3603

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-07-21T20:15:16.587

Modified: 2024-05-23T17:56:49.850


Link: CVE-2023-3603

JSON object: View

cve-icon Redhat Information

No data.

CWE