www.libssh.org Open in urlscan Pro
195.15.245.142  Public Scan

Submitted URL: http://libssh.org/
Effective URL: https://www.libssh.org//
Submission: On April 12 via manual from US — Scanned from CH

Form analysis 3 forms found in the DOM

GET https://www.libssh.org/

<form action="https://www.libssh.org/" method="get" class="czr-form search-form">
  <div class="form-group czr-focus">
    <label for="s-6619834388ada" id="lsearch-6619834388ada">
      <span class="screen-reader-text">Search</span>
      <input id="s-6619834388ada" class="form-control czr-search-field" name="s" type="search" value="" aria-describedby="lsearch-6619834388ada" placeholder="Search …">
    </label>
    <button type="submit" class="button"><i class="icn-search"></i><span class="screen-reader-text">Search …</span></button>
  </div>
</form>

GET https://www.libssh.org/

<form action="https://www.libssh.org/" method="get" class="czr-form search-form">
  <div class="form-group czr-focus">
    <label for="s-6619834388e0c" id="lsearch-6619834388e0c">
      <span class="screen-reader-text">Search</span>
      <input id="s-6619834388e0c" class="form-control czr-search-field" name="s" type="search" value="" aria-describedby="lsearch-6619834388e0c" placeholder="Search …">
    </label>
    <button type="submit" class="button"><i class="icn-search"></i><span class="screen-reader-text">Search …</span></button>
  </div>
</form>

GET https://www.libssh.org/

<form action="https://www.libssh.org/" method="get" class="czr-form search-form">
  <div class="form-group czr-focus">
    <label for="s-6619834388f40" id="lsearch-6619834388f40">
      <span class="screen-reader-text">Search</span>
      <input id="s-6619834388f40" class="form-control czr-search-field" name="s" type="search" value="" aria-describedby="lsearch-6619834388f40" placeholder="Search …">
    </label>
    <button type="submit" class="button"><i class="icn-search"></i><span class="screen-reader-text">Search …</span></button>
  </div>
</form>

Text Content

Skip to content

The SSH Library!
 * Features
 * Download
 * Communication
 * Development
   * Report a bug
   * Report a security bug
   * Security Process
   * Security bug bounty
   * Google Summer of Code
 * Imprint

 * Search
   Search Search …


The SSH Library!
 * Search
   Search Search …
   * Search Search …
 * Menu

 * Features
 * Download
 * Communication
 * Development
   * Report a bug
   * Report a security bug
   * Security Process
   * Security bug bounty
   * Google Summer of Code
 * Imprint


THE SSH LIBRARY!


LIBSSH IS A MULTIPLATFORM C LIBRARY IMPLEMENTING THE SSHV2 PROTOCOL ON CLIENT
AND SERVER SIDE. WITH LIBSSH, YOU CAN REMOTELY EXECUTE PROGRAMS, TRANSFER FILES,
USE A SECURE AND TRANSPARENT TUNNEL, MANAGE PUBLIC KEYS AND MUCH MORE ...


DOWNLOAD




API




REPORT A BUG




LIBSSH 0.10.6 AND LIBSSH 0.9.8 SECURITY RELEASES

Edit 22. 12. 2023: It turns out these releases have a regression in parsing IPv6
hostnames. The fixes are already available in the linked issue.

With festive season approaching, the libssh team comes with an early present of
new releases fixing three security issues.

The two new releases of libssh 0.9 and 0.10 address the following security
issues:

 * CVE-2023-6004: Command Injection using malicious hostname in expanded
   proxycommand. More details can be found in the advisory.
 * CVE-2023-48795: Avoid potential downgrade attacks by implementing strict kex.
   More details can be found in the advisory.
 * CVE-2023-6918: Avoid potential use of weak keys in low memory conditions by
   systematically checking return values of MD functions. More details can be
   found in the advisory.

In addition the 0.10 version contains several bugfixes and backports. For full
list, see the changelog below.

If you are new to libssh you should read our tutorial how to get started. Please
join our mailing list or visit Matrix channel if you have questions.

You can download libssh here.

Merry Christmas everyone!


CHANGELOG FOR LIBSSH 0.10.6

 * Fix CVE-2023-6004: Command injection using proxycommand
 * Fix CVE-2023-48795: Potential downgrade attack using strict kex
 * Fix CVE-2023-6918: Missing checks for return values of MD functions
 * Fix ssh_send_issue_banner() for CMD(PowerShell)
 * Avoid passing other events to callbacks when poll is called recursively
   (#202)
 * Allow @ in usernames when parsing from URI composes


CHANGELOG FOR LIBSSH 0.9.8

 * Fix CVE-2023-6004: Command injection using proxycommand
 * Fix CVE-2023-48795: Potential downgrade attack using strict kex
 * Fix CVE-2023-6918: Missing checks for return values of MD functions
 * Allow @ in usernames when parsing from URI composes



 * 


OPENHUB





POSTS NAVIGATION

 * 
 * * 1
   * 2
   * …
   * 68
 * Older posts Older posts

PROJECTS USING LIBSSH …

KDE uses libssh to implement the sftp module to allow secure file transfers
between different computers.

GITHUB

GitHub uses libssh in production to power its git SSH infrastructure, serving
millions of requests daily.

COCKPIT

Cockpit uses libssh for SSH public key authentication and to administer multiple
machine using one bastion host.

© 2024 libssh – All rights reserved - The libssh logo has been created by Robert
Lihm

Designed with Customizr Pro