ALT-PU-2019-2573-1
Closed vulnerabilities
Published: 2019-08-29
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-18594
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- openSUSE-SU-2019:2198
- openSUSE-SU-2019:2198
- openSUSE-SU-2019:2200
- openSUSE-SU-2019:2200
- https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF
- https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF
- https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
- https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
- https://github.com/nmap/nmap/issues/1077
- https://github.com/nmap/nmap/issues/1077
- https://github.com/nmap/nmap/issues/1227
- https://github.com/nmap/nmap/issues/1227
- https://seclists.org/nmap-announce/2019/0
- https://seclists.org/nmap-announce/2019/0
- https://seclists.org/nmap-dev/2018/q2/45
- https://seclists.org/nmap-dev/2018/q2/45
Published: 2018-08-08
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-15173
Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- http://code610.blogspot.com/2018/07/crashing-nmap-760.html
- http://code610.blogspot.com/2018/07/crashing-nmap-760.html
- http://code610.blogspot.com/2018/07/crashing-nmap-770.html
- http://code610.blogspot.com/2018/07/crashing-nmap-770.html
- openSUSE-SU-2019:1462
- openSUSE-SU-2019:1462
- openSUSE-SU-2019:2198
- openSUSE-SU-2019:2198
- openSUSE-SU-2019:2200
- openSUSE-SU-2019:2200
- https://security.netapp.com/advisory/ntap-20200827-0004/
- https://security.netapp.com/advisory/ntap-20200827-0004/