Vulnerability Name: | CVE-2020-16135 (CCN-186148) | ||||||||||||||||||||||||||||
Assigned: | 2020-06-03 | ||||||||||||||||||||||||||||
Published: | 2020-06-03 | ||||||||||||||||||||||||||||
Updated: | 2022-05-12 | ||||||||||||||||||||||||||||
Summary: | libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
5.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-16135 Source: MISC Type: Exploit, Issue Tracking, Vendor Advisory https://bugs.libssh.org/rLIBSSHe631ebb3e2247dd25e9678e6827c20dc73b73238 Source: CCN Type: libssh Bug T232 NULL pointer deref Source: MISC Type: Issue Tracking, Vendor Advisory https://bugs.libssh.org/T232 Source: XF Type: UNKNOWN libssh-cve202016135-dos(186148) Source: MISC Type: Third Party Advisory https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200731 [SECURITY] [DLA 2303-1] libssh security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-ac3e29073f Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-f4f5e49cb8 Source: GENTOO Type: Third Party Advisory GLSA-202011-05 Source: UBUNTU Type: Third Party Advisory USN-4447-1 Source: CCN Type: IBM Security Bulletin 6541298 (Cloud Pak for Automation) Multiple security vulnerabilities fixed in Cloud Pak for Automation components Source: CCN Type: IBM Security Bulletin 6551876 (Cloud Pak for Security) Cloud Pak for Security uses packages that are vulnerable to multiple CVEs Source: CCN Type: IBM Security Bulletin 6560126 (Sterling Connect:Direct for UNIX Certified Container) IBM Sterling Connect:Direct for UNIX Certified Container is affected by multiple vulnerabilities in Red Hat Universal Base Image version 8.4-206.1626828523 and Binutils version 2.30-93 Source: CCN Type: IBM Security Bulletin 6574787 (QRadar SIEM) IBM QRadar SIEM is vulnerable to using components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6856409 (Cloud Pak for Security) IBM Cloud Pak for Security includes components with multiple known vulnerabilities Source: CCN Type: Libssh Web site Libssh Source: CCN Type: Oracle CPUApr2022 Oracle Critical Patch Update Advisory - April 2022 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-16135 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |