ALAS2-2019-1263

Related Vulnerabilities: CVE-2019-3858   CVE-2019-3861  

An out of bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory. (CVE-2019-3858) An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory. (CVE-2019-3861)

ALAS2-2019-1263


Amazon Linux 2 Security Advisory: ALAS-2019-1263
Advisory Release Date: 2019-08-07 23:53 Pacific
Advisory Updated Date: 2019-08-09 13:32 Pacific
Severity: Medium

Issue Overview:

An out of bounds read flaw was discovered in libssh4 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory. (CVE-2019-3858)

An out of bounds read flaw was discovered in libssh4 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory. (CVE-2019-3861)


Affected Packages:

libssh4


Issue Correction:
Run yum update libssh4 to update your system.

New Packages:
aarch64:
    libssh4-1.4.3-12.amzn2.2.1.aarch64
    libssh4-devel-1.4.3-12.amzn2.2.1.aarch64
    libssh4-debuginfo-1.4.3-12.amzn2.2.1.aarch64

i686:
    libssh4-1.4.3-12.amzn2.2.1.i686
    libssh4-devel-1.4.3-12.amzn2.2.1.i686
    libssh4-debuginfo-1.4.3-12.amzn2.2.1.i686

noarch:
    libssh4-docs-1.4.3-12.amzn2.2.1.noarch

src:
    libssh4-1.4.3-12.amzn2.2.1.src

x86_64:
    libssh4-1.4.3-12.amzn2.2.1.x86_64
    libssh4-devel-1.4.3-12.amzn2.2.1.x86_64
    libssh4-debuginfo-1.4.3-12.amzn2.2.1.x86_64