{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-2283","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-11-03T20:35:18.528Z","dateReserved":"2023-04-25T00:00:00.000Z","datePublished":"2023-05-26T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2024-02-01T17:06:59.699Z"},"descriptions":[{"lang":"en","value":"A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK."}],"affected":[{"vendor":"n/a","product":"libssh","versions":[{"version":"libssh-2","status":"affected"}]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-2283"},{"url":"https://www.libssh.org/security/advisories/CVE-2023-2283.txt"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189736"},{"name":"FEDORA-2023-5fa5ca2043","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/"},{"url":"http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html"},{"name":"GLSA-202312-05","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202312-05"},{"url":"https://security.netapp.com/advisory/ntap-20240201-0005/"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287","cweId":"CWE-287"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-2283","tags":["x_transferred"]},{"url":"https://www.libssh.org/security/advisories/CVE-2023-2283.txt","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189736","tags":["x_transferred"]},{"name":"FEDORA-2023-5fa5ca2043","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/"},{"url":"http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html","tags":["x_transferred"]},{"name":"GLSA-202312-05","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202312-05"},{"url":"https://security.netapp.com/advisory/ntap-20240201-0005/","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2025/Feb/18"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:35:18.528Z"}}]}}