中危 openssh 安全漏洞 (CVE-2023-48795)

CVE编号

CVE-2023-48795

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-12-19
漏洞描述
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, and libssh before 0.10.6; and there could be effects on Bitvise SSH through 9.31.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
http://seclists.org/fulldisclosure/2024/Mar/21
http://www.openwall.com/lists/oss-security/2023/12/18/3
http://www.openwall.com/lists/oss-security/2023/12/19/5
http://www.openwall.com/lists/oss-security/2023/12/20/3
https://access.redhat.com/security/cve/cve-2023-48795
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integr...
https://bugs.gentoo.org/920280
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
https://bugzilla.suse.com/show_bug.cgi?id=1217950
https://crates.io/crates/thrussh/versions
https://filezilla-project.org/versions.php
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273...
https://github.com/advisories/GHSA-45x7-px36-x8w8
https://github.com/apache/mina-sshd/issues/445
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
https://github.com/cyd01/KiTTY/issues/520
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/l...
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
https://github.com/hierynomus/sshj/issues/916
https://github.com/janmojzis/tinyssh/issues/81
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
https://github.com/libssh2/libssh2/pull/1291
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd...
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
https://github.com/mwiede/jsch/issues/457
https://github.com/mwiede/jsch/pull/461
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33...
https://github.com/NixOS/nixpkgs/pull/275249
https://github.com/openssh/openssh-portable/commits/master
https://github.com/paramiko/paramiko/issues/2337
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397...
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad...
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
https://github.com/proftpd/proftpd/issues/456
https://github.com/rapier1/hpn-ssh/releases
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
https://github.com/ronf/asyncssh/tags
https://github.com/ssh-mitm/ssh-mitm/issues/165
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4a...
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
https://github.com/warp-tech/russh/releases/tag/v0.40.2
https://gitlab.com/libssh/libssh-mirror/-/tags
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
https://help.panic.com/releasenotes/transmit5/
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerabilit...
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://matt.ucc.asn.au/dropbear/CHANGES
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL...
https://news.ycombinator.com/item?id=38684904
https://news.ycombinator.com/item?id=38685286
https://news.ycombinator.com/item?id=38732005
https://nova.app/releases/#v11.8
https://oryx-embedded.com/download/#changelog
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
https://roumenpetrov.info/secsh/#news20231220
https://security-tracker.debian.org/tracker/CVE-2023-48795
https://security-tracker.debian.org/tracker/source-package/libssh2
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
https://security.gentoo.org/glsa/202312-16
https://security.gentoo.org/glsa/202312-17
https://security.netapp.com/advisory/ntap-20240105-0004/
https://support.apple.com/kb/HT214084
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
https://twitter.com/TrueSkrillor/status/1736774389725565005
https://ubuntu.com/security/CVE-2023-48795
https://winscp.net/eng/docs/history#6.2.2
https://www.bitvise.com/ssh-client-version-history#933
https://www.bitvise.com/ssh-server-version-history
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
https://www.debian.org/security/2023/dsa-5586
https://www.debian.org/security/2023/dsa-5588
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
https://www.netsarang.com/en/xshell-update-history/
https://www.openssh.com/openbsd.html
https://www.openssh.com/txt/release-9.6
https://www.openwall.com/lists/oss-security/2023/12/18/2
https://www.openwall.com/lists/oss-security/2023/12/20/3
https://www.paramiko.org/changelog.html
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_c...
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka...
https://www.terrapin-attack.com
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
https://www.vandyke.com/products/securecrt/history.txt
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 apache sshd * Up to
(including)
2.11.0
运行在以下环境
应用 apache sshj * Up to
(including)
0.37.0
运行在以下环境
应用 asyncssh_project asyncssh * Up to
(excluding)
2.14.2
运行在以下环境
应用 bitvise ssh_client * Up to
(excluding)
9.33
运行在以下环境
应用 bitvise ssh_server * Up to
(excluding)
9.32
运行在以下环境
应用 connectbot sshlib * Up to
(excluding)
2.2.22
运行在以下环境
应用 crates thrussh * Up to
(excluding)
0.35.1
运行在以下环境
应用 crushftp crushftp * Up to
(excluding)
10.6.0
运行在以下环境
应用 crushftp crushftp * Up to
(including)
10.6.0
运行在以下环境
应用 dropbear_ssh_project dropbear_ssh * Up to
(excluding)
2022.83
运行在以下环境
应用 erlang erlang/otp * Up to
(excluding)
26.2.1
运行在以下环境
应用 filezilla-project filezilla_client * Up to
(excluding)
3.66.4
运行在以下环境
应用 gentoo security - -
运行在以下环境
应用 golang crypto * Up to
(excluding)
0.17.0
运行在以下环境
应用 jadaptive maverick_synergy_java_ssh_api * Up to
(excluding)
3.1.0-snapshot
运行在以下环境
应用 kitty_project kitty * Up to
(including)
0.76.1.13
运行在以下环境
应用 libssh libssh * Up to
(excluding)
0.10.6
运行在以下环境
应用 libssh2 libssh2 * Up to
(excluding)
1.11.10
运行在以下环境
应用 matez jsch * Up to
(excluding)
0.2.15
运行在以下环境
应用 microsoft powershell * Up to
(including)
11.1.0
运行在以下环境
应用 net-ssh net-ssh 7.2.0 -
运行在以下环境
应用 netgate pfsense_ce * Up to
(including)
2.7.2
运行在以下环境
应用 netgate pfsense_plus * Up to
(including)
23.09.1
运行在以下环境
应用 netsarang xshell_7 * Up to
(excluding)
build__0144
运行在以下环境
应用 openbsd openssh * Up to
(excluding)
9.6
运行在以下环境
应用 oryx-embedded cyclone_ssh * Up to
(excluding)
2.3.4
运行在以下环境
应用 panic nova * Up to
(excluding)
11.8
运行在以下环境
应用 panic transmit_5 * Up to
(excluding)
5.10.4
运行在以下环境
应用 paramiko paramiko * Up to
(excluding)
3.4.0
运行在以下环境
应用 proftpd proftpd * Up to
(including)
1.3.8b
运行在以下环境
应用 putty putty * Up to
(excluding)
0.80
运行在以下环境
应用 redhat advanced_cluster_security 3.0 -
运行在以下环境
应用 redhat advanced_cluster_security 4.0 -
运行在以下环境
应用 redhat ceph_storage 6.0 -
运行在以下环境
应用 redhat cert-manager_operator_for_red_hat_openshift - -
运行在以下环境
应用 redhat discovery - -
运行在以下环境
应用 redhat jboss_enterprise_application_platform 7.0 -
运行在以下环境
应用 redhat keycloak - -
运行在以下环境
应用 redhat openshift_api_for_data_protection - -
运行在以下环境
应用 redhat openshift_container_platform 4.0 -
运行在以下环境
应用 redhat openshift_data_foundation 4.0 -
运行在以下环境
应用 redhat openshift_developer_tools_and_services - -
运行在以下环境
应用 redhat openshift_dev_spaces - -
运行在以下环境
应用 redhat openshift_gitops - -
运行在以下环境
应用 redhat openshift_pipelines - -
运行在以下环境
应用 redhat openshift_serverless - -
运行在以下环境
应用 redhat openshift_virtualization 4 -
运行在以下环境
应用 redhat openstack_platform 16.1 -
运行在以下环境
应用 redhat openstack_platform 16.2 -
运行在以下环境
应用 redhat openstack_platform 17.1 -
运行在以下环境
应用 redhat single_sign-on 7.0 -
运行在以下环境
应用 redhat storage 3.0 -
运行在以下环境
应用 roumenpetrov pkixssh * Up to
(excluding)
14.4
运行在以下环境
应用 russh_project russh * Up to
(excluding)
0.40.2
运行在以下环境
应用 sftpgo_project sftpgo * Up to
(excluding)
2.5.6
运行在以下环境
应用 ssh ssh * Up to
(excluding)
5.11
运行在以下环境
应用 ssh2_project ssh2 * Up to
(including)
1.11.0
运行在以下环境
应用 tera_term_project tera_term * Up to
(including)
5.1
运行在以下环境
应用 tinyssh tinyssh * Up to
(including)
20230101
运行在以下环境
应用 trilead ssh2 6401 -
运行在以下环境
应用 vandyke securecrt * Up to
(excluding)
9.4.3
运行在以下环境
应用 winscp winscp * Up to
(excluding)
6.2.2
运行在以下环境
系统 alma_linux_8 libssh * Up to
(excluding)
0.9.6-13.el8_9
运行在以下环境
系统 alpine_3.16 libssh2 * Up to
(excluding)
1.11.0-r0
运行在以下环境
系统 alpine_3.17 putty * Up to
(excluding)
9.1_p1-r5
运行在以下环境
系统 alpine_3.18 putty * Up to
(excluding)
2022.83-r2
运行在以下环境
系统 alpine_3.19 doctl * Up to
(excluding)
9.6_p1-r0
运行在以下环境
系统 amazon_2 openssh * Up to
(excluding)
7.4p1-22.amzn2.0.6
运行在以下环境
系统 amazon_2023 libssh * Up to
(excluding)
0.10.6-1.amzn2023.0.1
运行在以下环境
系统 amazon_AMI openssh * Up to
(excluding)
7.4p1-22.81.amzn1
运行在以下环境
系统 anolis_os_23 libssh * Up to
(excluding)
0.10.6-1
运行在以下环境
系统 anolis_os_8 libssh * Up to
(excluding)
0.9.6-11
运行在以下环境
系统 apple macos - -
运行在以下环境
系统 debian debian_linux - -
运行在以下环境
系统 fedora_38 putty * Up to
(excluding)
0.80-1.fc38
运行在以下环境
系统 fedora_39 putty * Up to
(excluding)
0.80-1.fc39
运行在以下环境
系统 fedora_40 gh * Up to
(excluding)
2.41.0-1.fc40
运行在以下环境
系统 fedora_EPEL_8 putty * Up to
(excluding)
0.80-1.el8
运行在以下环境
系统 fedora_EPEL_9 putty * Up to
(excluding)
0.80-1.el9
运行在以下环境
系统 freebsd freebsd * Up to
(including)
12.4
运行在以下环境
系统 kylinos_aarch64_V10SP1 libssh * Up to
(excluding)
0.9.4-9.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 libssh * Up to
(excluding)
0.9.4-9.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 libssh * Up to
(excluding)
0.9.4-9.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 libssh * Up to
(excluding)
0.9.4-9.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 libssh * Up to
(excluding)
0.9.4-9.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 libssh * Up to
(excluding)
0.9.4-9.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 libssh * Up to
(excluding)
0.9.4-9.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 libssh * Up to
(excluding)
0.9.4-9.ky10
运行在以下环境
系统 lancom-systems lanconfig - -
运行在以下环境
系统 lancom-systems lcos * Up to
(including)
3.66.4
运行在以下环境
系统 lancom-systems lcos_fx - -
运行在以下环境
系统 lancom-systems lcos_lx - -
运行在以下环境
系统 lancom-systems lcos_sx 4.20 -
运行在以下环境
系统 lancom-systems lcos_sx 5.20 -
运行在以下环境
系统 opensuse_5.3 libssh2 * Up to
(excluding)
1-1.11.0-150000.4.22.1
运行在以下环境
系统 opensuse_5.4 libssh2 * Up to
(excluding)
1-1.11.0-150000.4.22.1
运行在以下环境
系统 opensuse_Leap_15.4 putty * Up to
(excluding)
0.80-bp154.2.3.1
运行在以下环境
系统 opensuse_Leap_15.5 putty * Up to
(excluding)
0.80-bp155.2.3.1
运行在以下环境
系统 redhat enterprise_linux 8.0 -
运行在以下环境
系统 redhat enterprise_linux 9.0 -
运行在以下环境
系统 redhat_8 libssh * Up to
(excluding)
0.9.6-13.el8_9
运行在以下环境
系统 suse_12_SP5 libssh2 * Up to
(excluding)
1-1.11.0-29.9.1
运行在以下环境
系统 thorntech sftp_gateway_firmware * Up to
(excluding)
3.4.6
运行在以下环境
系统 ubuntu_20.04 libssh * Up to
(excluding)
0.9.3-2ubuntu2.4
运行在以下环境
系统 ubuntu_22.04 libssh * Up to
(excluding)
3.58.0-1ubuntu0.1
阿里云评分
5.4
  • 攻击路径
    本地
  • 攻击复杂度
    困难
  • 权限要求
    管控权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-354 完整性检查值验证不恰当
阿里云安全产品覆盖情况