CVE-2024-43410

Russh has an OOM Denial of Service due to allocation of untrusted amount

Description

Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length. After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.06%
Affected: Eugeny russh
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-43410?
CVE-2024-43410 has been scored as a high severity vulnerability.
How to fix CVE-2024-43410?
To fix CVE-2024-43410, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-43410 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-43410 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-43410?
CVE-2024-43410 affects Eugeny russh.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.