Skip to content

x/crypto/ssh: implement strict KEX protocol changes #64784

Closed
openshift/egress-router-cni
#84
@rolandshoemaker

Description

@rolandshoemaker

A MITM attacker can arbitrarily delete messages from a connection before the secure channel is established, as sequence numbers are only validated once the channel is established and arbitrary messages are allowed during the handshake, allowing them to manipulate the sequence numbers. Depending on the cipher being used, once the secure channel is established, the attacker can then use the manipulated sequence numbers to delete messages sent immediately after the channel is established.

These issues were fixed in OpenSSH 9.6, and documented in section 1.9 of the PROTOCOL file.

This is CVE-2023-48795.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions