CVE-2023-48795 (CNNVD-202312-1668)

MEDIUM
中文标题:
OpenSSH 安全漏洞
英文标题:
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other pr...
CVSS分数: 5.9
发布时间: 2023-12-18 00:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 9.6之前版本存在安全漏洞,该漏洞源于允许远程攻击者绕过完整性检查,从而省略某些数据包。

英文描述:

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

CWE类型:
CWE-354
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
openbsd openssh * - - cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
putty putty * - - cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
filezilla-project filezilla_client * - - cpe:2.3:a:filezilla-project:filezilla_client:*:*:*:*:*:*:*:*
panic transmit_5 * - - cpe:2.3:a:panic:transmit_5:*:*:*:*:*:*:*:*
panic nova * - - cpe:2.3:a:panic:nova:*:*:*:*:*:*:*:*
roumenpetrov pkixssh * - - cpe:2.3:a:roumenpetrov:pkixssh:*:*:*:*:*:*:*:*
winscp winscp * - - cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*
bitvise ssh_client * - - cpe:2.3:a:bitvise:ssh_client:*:*:*:*:*:*:*:*
bitvise ssh_server * - - cpe:2.3:a:bitvise:ssh_server:*:*:*:*:*:*:*:*
lancom-systems lcos * - - cpe:2.3:o:lancom-systems:lcos:*:*:*:*:*:*:*:*
lancom-systems lcos_fx - - - cpe:2.3:o:lancom-systems:lcos_fx:-:*:*:*:*:*:*:*
lancom-systems lcos_lx - - - cpe:2.3:o:lancom-systems:lcos_lx:-:*:*:*:*:*:*:*
lancom-systems lcos_sx 4.20 - - cpe:2.3:o:lancom-systems:lcos_sx:4.20:*:*:*:*:*:*:*
lancom-systems lcos_sx 5.20 - - cpe:2.3:o:lancom-systems:lcos_sx:5.20:*:*:*:*:*:*:*
lancom-systems lanconfig - - - cpe:2.3:o:lancom-systems:lanconfig:-:*:*:*:*:*:*:*
vandyke securecrt * - - cpe:2.3:a:vandyke:securecrt:*:*:*:*:*:*:*:*
libssh libssh * - - cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
net-ssh net-ssh 7.2.0 - - cpe:2.3:a:net-ssh:net-ssh:7.2.0:*:*:*:*:ruby:*:*
ssh2_project ssh2 * - - cpe:2.3:a:ssh2_project:ssh2:*:*:*:*:*:node.js:*:*
proftpd proftpd * - - cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*
freebsd freebsd * - - cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
crates thrussh * - - cpe:2.3:a:crates:thrussh:*:*:*:*:*:*:*:*
tera_term_project tera_term * - - cpe:2.3:a:tera_term_project:tera_term:*:*:*:*:*:*:*:*
oryx-embedded cyclone_ssh * - - cpe:2.3:a:oryx-embedded:cyclone_ssh:*:*:*:*:*:*:*:*
crushftp crushftp * - - cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
netsarang xshell_7 * - - cpe:2.3:a:netsarang:xshell_7:*:*:*:*:*:*:*:*
paramiko paramiko * - - cpe:2.3:a:paramiko:paramiko:*:*:*:*:*:*:*:*
redhat openshift_container_platform 4.0 - - cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
redhat openstack_platform 16.1 - - cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
redhat openstack_platform 16.2 - - cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
redhat openstack_platform 17.1 - - cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*
redhat ceph_storage 6.0 - - cpe:2.3:a:redhat:ceph_storage:6.0:*:*:*:*:*:*:*
redhat enterprise_linux 8.0 - - cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhat enterprise_linux 9.0 - - cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
redhat openshift_serverless - - - cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*
redhat openshift_gitops - - - cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*
redhat openshift_pipelines - - - cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*
redhat openshift_developer_tools_and_services - - - cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*
redhat openshift_data_foundation 4.0 - - cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*
redhat openshift_api_for_data_protection - - - cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*
redhat openshift_virtualization 4 - - cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*
redhat storage 3.0 - - cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*
redhat discovery - - - cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*
redhat openshift_dev_spaces - - - cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*
redhat cert-manager_operator_for_red_hat_openshift - - - cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*
redhat keycloak - - - cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
redhat jboss_enterprise_application_platform 7.0 - - cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
redhat single_sign-on 7.0 - - cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
redhat advanced_cluster_security 3.0 - - cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*
redhat advanced_cluster_security 4.0 - - cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*
golang crypto * - - cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*
russh_project russh * - - cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*
sftpgo_project sftpgo * - - cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*
erlang erlang\/otp * - - cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
matez jsch * - - cpe:2.3:a:matez:jsch:*:*:*:*:*:*:*:*
libssh2 libssh2 * - - cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*
asyncssh_project asyncssh * - - cpe:2.3:a:asyncssh_project:asyncssh:*:*:*:*:*:*:*:*
dropbear_ssh_project dropbear_ssh * - - cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*
jadaptive maverick_synergy_java_ssh_api * - - cpe:2.3:a:jadaptive:maverick_synergy_java_ssh_api:*:*:*:*:*:*:*:*
ssh ssh * - - cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*
thorntech sftp_gateway_firmware * - - cpe:2.3:o:thorntech:sftp_gateway_firmware:*:*:*:*:*:*:*:*
netgate pfsense_plus * - - cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*
netgate pfsense_ce * - - cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*
connectbot sshlib * - - cpe:2.3:a:connectbot:sshlib:*:*:*:*:*:*:*:*
apache sshd * - - cpe:2.3:a:apache:sshd:*:*:*:*:*:*:*:*
apache sshj * - - cpe:2.3:a:apache:sshj:*:*:*:*:*:*:*:*
tinyssh tinyssh * - - cpe:2.3:a:tinyssh:tinyssh:*:*:*:*:*:*:*:*
trilead ssh2 6401 - - cpe:2.3:a:trilead:ssh2:6401:*:*:*:*:*:*:*
9bis kitty * - - cpe:2.3:a:9bis:kitty:*:*:*:*:*:*:*:*
gentoo security - - - cpe:2.3:a:gentoo:security:-:*:*:*:*:*:*:*
fedoraproject fedora 38 - - cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
fedoraproject fedora 39 - - cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
apple macos * - - cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
[oss-security] 20231218 CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack) mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
[oss-security] 20231219 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack) mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
[oss-security] 20231220 Re: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack) mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
FEDORA-2023-0733306be9 vendor-advisory
cve.org
访问
DSA-5586 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
DSA-5588 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
[debian-lts-announce] 20231226 [SECURITY] [DLA 3694-1] openssh security update mailing-list
cve.org
访问
GLSA-202312-16 vendor-advisory
cve.org
访问
GLSA-202312-17 vendor-advisory
cve.org
访问
FEDORA-2023-20feb865d8 vendor-advisory
cve.org
访问
FEDORA-2023-cb8c606fbb vendor-advisory
cve.org
访问
FEDORA-2023-e77300e4b5 vendor-advisory
cve.org
访问
FEDORA-2023-b87ec6cf47 vendor-advisory
cve.org
访问
FEDORA-2023-153404713b vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
FEDORA-2024-3bb23c77f3 vendor-advisory
cve.org
访问
FEDORA-2023-55800423a8 vendor-advisory
cve.org
访问
FEDORA-2024-d946b9ad25 vendor-advisory
cve.org
访问
FEDORA-2024-71c2c6526c vendor-advisory
cve.org
访问
FEDORA-2024-39a8c72ea9 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
FEDORA-2024-ae653fb07b vendor-advisory
cve.org
访问
FEDORA-2024-2705241461 vendor-advisory
cve.org
访问
FEDORA-2024-fb32950d11 vendor-advisory
cve.org
访问
FEDORA-2024-7b08207cdb vendor-advisory
cve.org
访问
FEDORA-2024-06ebb70bdd vendor-advisory
cve.org
访问
[debian-lts-announce] 20240125 [SECURITY] [DLA 3718-1] php-phpseclib security update mailing-list
cve.org
访问
[debian-lts-announce] 20240125 [SECURITY] [DLA 3719-1] phpseclib security update mailing-list
cve.org
访问
FEDORA-2024-a53b24023d vendor-advisory
cve.org
访问
FEDORA-2024-3fd1bc9276 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4 mailing-list
cve.org
访问
[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update mailing-list
cve.org
访问
[oss-security] 20240417 Terrapin vulnerability in Jenkins CLI client mailing-list
cve.org
访问
[oss-security] 20240306 Multiple vulnerabilities in Jenkins plugins mailing-list
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (adp)
MEDIUM
5.9
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
机密性
NONE
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2023-12-18 00:00:00
修改时间:
2025-11-04 22:05:21
创建时间:
2025-11-11 15:38:42
更新时间:
2025-11-11 15:58:22
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2023-48795 2025-11-11 15:22:10 2025-11-11 07:38:42
NVD nvd_CVE-2023-48795 2025-11-11 14:59:16 2025-11-11 07:46:47
CNNVD cnnvd_CNNVD-202312-1668 2025-11-11 15:12:23 2025-11-11 07:58:22
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:58:22
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202312-1668; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202312-1668
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:46:47
affected_products_count: 0 → 74; references_count: 118 → 134; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 0 -> 74
  • references_count: 118 -> 134
  • data_sources: ['cve'] -> ['cve', 'nvd']