SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Bitvise FlowSsh Library Vendors:   Bitvise
Bitvise FlowSsh Library Invalid Memory Access and zlib Compression Library Flaws Let Remote Users Deny Service
SecurityTracker Alert ID:  1040943
SecurityTracker URL:  http://securitytracker.com/id/1040943
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 19 2018
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.41
Description:   Two vulnerabilities were reported in Bitvise FlowSsh Library. A remote user can cause denial of service conditions on the target system.

A remote server can return a specially crafted packet to the target connected application that uses a 32-bit version of the FlowSsh library to trigger an invalid memory access error and cause the application to stop processing. The specific impact depends on the application using the library.

A remote authenticated user can trigger a race condition in a zlib compression library component to corrupt decompressed data in a different user's session. A FlowSsh application that simultaneously starts multiple concurrent SSH sessions after launching may be affected.

Impact:   A remote user can cause denial of service conditions.
Solution:   The vendor has issued a fix (7.41) [in April 2018].

The vendor advisory is available at:

https://www.bitvise.com/flowssh-version-history#security-notification-741

Vendor URL:  www.bitvise.com/flowssh-version-history#security-notification-741 (Links to External Site)
Cause:   Access control error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC