A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2023-07-21T19:09:44.083Z

Updated: 2024-08-02T07:01:56.718Z

Reserved: 2023-07-10T18:21:21.431Z

Link: CVE-2023-3603

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-07-21T20:15:16.587

Modified: 2024-05-23T17:56:49.850

Link: CVE-2023-3603

cve-icon Redhat

Severity : Low

Publid Date: 2023-07-10T00:00:00Z

Links: CVE-2023-3603 - Bugzilla