CVE-2026-23943

UNKNOWN
中文标题:
(暂无数据)
英文标题:
Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_
CVSS分数: N/A
发布时间: 2026-03-13 19:54:15
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS. Two compression algorithms are affected: * zlib: Activates immediately after key exchange, enabling unauthenticated attacks * zlib@openssh.com: Activates post-authentication, enabling authenticated attacks Each SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments. This vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4. This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.

CWE类型:
CWE-409
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
6b3ad84c-e1a6-4bf7-a703-f496b71e49db OTHER
nvd.nist.gov
访问
6b3ad84c-e1a6-4bf7-a703-f496b71e49db OTHER
nvd.nist.gov
访问
6b3ad84c-e1a6-4bf7-a703-f496b71e49db OTHER
nvd.nist.gov
访问
6b3ad84c-e1a6-4bf7-a703-f496b71e49db OTHER
nvd.nist.gov
访问
6b3ad84c-e1a6-4bf7-a703-f496b71e49db OTHER
nvd.nist.gov
访问
CVSS评分详情
暂无CVSS评分信息
时间信息
发布时间:
2026-03-13 19:54:15
修改时间:
2026-03-13 19:54:15
创建时间:
2026-03-14 06:00:01
更新时间:
2026-03-14 06:00:01
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-23943 2026-03-14 02:00:05 2026-03-13 22:00:01
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史