CVE-2023-6004

NameCVE-2023-6004
DescriptionA flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5591-1
Debian Bugs1059061

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libssh (PTS)jessie, jessie (lts)0.6.3-4+deb8u6vulnerable
stretch (security)0.7.3-2+deb9u3vulnerable
stretch (lts), stretch0.7.3-2+deb9u4vulnerable
buster (security), buster, buster (lts)0.8.7-1+deb10u2vulnerable
bullseye (security), bullseye0.9.8-0+deb11u1fixed
bookworm (security), bookworm0.10.6-0+deb12u1fixed
sid, trixie0.11.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libsshsourcejessie(unfixed)end-of-life
libsshsourcebullseye0.9.8-0+deb11u1DSA-5591-1
libsshsourcebookworm0.10.6-0+deb12u1DSA-5591-1
libsshsource(unstable)0.10.6-11059061

Notes

https://www.libssh.org/security/advisories/CVE-2023-6004.txt
https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html
https://gitlab.com/libssh/libssh-mirror/-/commit/c2c56bacab00766d01671413321d564227aabf19 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/a66b4a6eae6614d200a3625862d77565b96a7cd3 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/8615c24647f773a5e04203c7459512715d698be1 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/c6180409677c765e6b9ae2b18a3a7a9671ac1dbe (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/9bbb817c0c5434f03613d0783b2ef5f52235b901 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/22492b69bba22b102342afc574800d354a08e405 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/d7467498fd988949edde9c6384973250fd454a8b (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/62d3101c1f76b6891b70c50154e0e934d6b8cb57 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/cea841d71c025f9c998b7d5fc9f2a2839df62921 (libssh-0.10.6)
https://gitlab.com/libssh/libssh-mirror/-/commit/2c492ee179d5caa2718c5e768bab6e0b2b64a8b0 (libssh-0.10.6)
Original patchset introduces a regression (with IPv6 parsing in ssh_options_set API):
https://gitlab.com/libssh/libssh-mirror/-/issues/227

Search for package or bug name: Reporting problems