You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Twisted SSH client and server deny of service during SSH handshake.
High severity
GitHub Reviewed
Published
Mar 3, 2022
in
twisted/twisted
•
Updated Nov 25, 2024
The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier.
A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as nc -rv localhost 22 < /dev/zero.
Impact
The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier.
A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as
nc -rv localhost 22 < /dev/zero
.Patches
The issue was fix in GitHub commit twisted/twisted@98387b3
A fix is available in Twisted 22.2.0.
Workarounds
References
Reported at https://twistedmatrix.com/trac/ticket/10284
Discussions at GHSA-rv6r-3f5q-9rgx
For more information
Found by vin01
References