357
VMScore

CVE-2022-31124

Published: 06/07/2022 Updated: 14/07/2022
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 357
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions before 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6, which no longer includes the raw field value in the error message. There are no known workarounds for this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssh key parser project openssh key parser

Github Repositories

openssh_key_parser Please don't use versions 001 - 005, which are affected by CVE-2022-31124, a High severity vulnerability Upgrade to at least version 006 This repository provides openssh_key, a Python package providing utilities to parse and pack OpenSSH private and public key files It supports parsing and packing keys of all types currently supported by OpenSSH

With this project, I will show you how to use Zenmap and Wireshark to analyze a networks topology, audit systems, and scan for vulenerabilities.

Vulnerability-Scanning With this project, I will show you how to use Zenmap and Wireshark to analyze a networks topology, audit systems, and scan for vulenerabilities Overview Cybersecurity is a broad field with lots of topics to study on yet one of the most important things you can do, is know your network Here we will show you how to utilize simple tools that will help you