Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yMzI2LWh4N2ctM205cs4AA-jM

Apache MINA SSHD: integrity check bypass

Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which
some security features have been downgraded or disabled, aka a Terrapin
attack

The mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected.

Permalink: https://github.com/advisories/GHSA-2326-hx7g-3m9r
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yMzI2LWh4N2ctM205cs4AA-jM
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 3 months ago
Updated: 3 months ago


CVSS Score: 5.9
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-2326-hx7g-3m9r, CVE-2024-41909
References: Repository: https://github.com/apache/mina-sshd
Blast Radius: 13.1

Affected Packages

maven:org.apache.sshd:sshd-common
Dependent packages: 87
Dependent repositories: 165
Downloads:
Affected Version Ranges: < 2.12.0
Fixed in: 2.12.0
All affected versions: 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.5.1, 2.6.0, 2.7.0, 2.8.0, 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.10.0, 2.11.0
All unaffected versions: 2.12.0, 2.12.1, 2.13.0, 2.13.1, 2.13.2, 2.14.0