漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash_equals()
Vulnerability Description
phpseclib is a PHP secure communications library. Starting in 0.1.1 and prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-circuits on the first differing byte. This is a real variable-time comparison (CWE-208), proven by scaling benchmarks. This vulnerability is fixed in 3.0.51, 2.0.53, and 1.0.28.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
通过时间差异性导致的信息暴露
Vulnerability Title
phpseclib 安全漏洞
Vulnerability Description
phpseclib是phpseclib开源的一个 PHP 安全通信库。 phpseclib 3.0.51之前版本、2.0.53之前版本和1.0.28之前版本存在安全漏洞,该漏洞源于phpseclibNetSSH2::get_binary_packet()使用PHP的!=运算符比较接收到的SSH数据包HMAC与本地计算的HMAC,存在可变时间比较问题。
CVSS Information
N/A
Vulnerability Type
N/A