Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/crypto/ssh: implement strict KEX protocol changes #64784

Closed
rolandshoemaker opened this issue Dec 18, 2023 · 1 comment
Closed

x/crypto/ssh: implement strict KEX protocol changes #64784

rolandshoemaker opened this issue Dec 18, 2023 · 1 comment
Labels
Milestone

Comments

@rolandshoemaker
Copy link
Member

A MITM attacker can arbitrarily delete messages from a connection before the secure channel is established, as sequence numbers are only validated once the channel is established and arbitrary messages are allowed during the handshake, allowing them to manipulate the sequence numbers. Depending on the cipher being used, once the secure channel is established, the attacker can then use the manipulated sequence numbers to delete messages sent immediately after the channel is established.

These issues were fixed in OpenSSH 9.6, and documented in section 1.9 of the PROTOCOL file.

This is CVE-2023-48795.

@gopherbot gopherbot added this to the Unreleased milestone Dec 18, 2023
@gopherbot
Copy link

Change https://go.dev/cl/550715 mentions this issue: ssh: implement strict KEX protocol changes

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants