nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://seclists.org/nmap-dev/2018/q2/45 | third party advisory mailing list |
https://github.com/nmap/nmap/issues/1227 | third party advisory exploit |
https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad | third party advisory patch |
https://github.com/nmap/nmap/issues/1077 | third party advisory patch |
https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF | third party advisory |
https://seclists.org/nmap-announce/2019/0 | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html | vendor advisory |