8.8
CVSSv3

CVE-2019-3855

Published: 21/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 831
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

An integer overflow flaw which could lead to an out of bounds write exists in libssh2 prior to 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libssh2 libssh2

fedoraproject fedora 28

fedoraproject fedora 29

fedoraproject fedora 30

debian debian linux 8.0

debian debian linux 9.0

netapp ontap select deploy administration utility -

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux 8.0

opensuse leap 42.3

apple xcode

oracle peoplesoft enterprise peopletools 8.56

oracle peoplesoft enterprise peopletools 8.57

Vendor Advisories

Chris Coulson discovered several vulnerabilities in libssh2, a SSH2 client-side library, which could result in denial of service, information leaks or the execution of arbitrary code For the stable distribution (stretch), these problems have been fixed in version 170-1+deb9u1 We recommend that you upgrade your libssh2 packages For the detailed ...
Debian Bug report logs - #924965 libssh2: CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 Package: src:libssh2; Maintainer for src:libssh2 is Mikhail Gusarov <dottedmag@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: ...
Debian Bug report logs - #932329 libssh2: CVE-2019-13115 Package: src:libssh2; Maintainer for src:libssh2 is Mikhail Gusarov <dottedmag@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 17 Jul 2019 19:24:02 UTC Severity: important Tags: security, upstream Found in version libssh2/180-2 ...
Synopsis Important: libssh2 security update Type/Severity Security Advisory: Important Topic An update for libssh2 is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Important: libssh2 security update Type/Severity Security Advisory: Important Topic An update for libssh2 is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Important: libssh2 security update Type/Severity Security Advisory: Important Topic An update for libssh2 is now available for Red Hat Enterprise Linux 73 Advanced Update Support, Red Hat Enterprise Linux 73 Telco Extended Update Support, and Red Hat Enterprise Linux 73 Update Services for SAP S ...
Synopsis Important: libssh2 security update Type/Severity Security Advisory: Important Topic An update for libssh2 is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: libssh2 security update Type/Severity Security Advisory: Important Topic An update for libssh2 is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: virt:rhel security update Type/Severity Security Advisory: Important Topic An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CV ...
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 in the way keyboard prompt requests are parsed A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server(CVE-2019-3856) An integer overflow flaw which could lead to an out of boun ...
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 in the way packets are read from the server A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server(CVE-2019-3855) An integer overflow flaw which could lead to an out of bounds wr ...
A out-of-bounds write has been found in libssh2 before 181, where a malicious server could send a specially crafted packet which could result in an unchecked integer overflow The value would then be used to allocate memory causing a possible memory write out of bounds error ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [SECURITY ADVISORIES] libssh2 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Stenberg &lt;daniel () haxx ...

References

CWE-787CWE-190https://www.libssh2.org/CVE-2019-3855.htmlhttps://seclists.org/bugtraq/2019/Mar/25https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855http://www.securityfocus.com/bid/107485http://www.openwall.com/lists/oss-security/2019/03/18/3http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.htmlhttps://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767https://lists.debian.org/debian-lts-announce/2019/03/msg00032.htmlhttps://security.netapp.com/advisory/ntap-20190327-0005/https://access.redhat.com/errata/RHSA-2019:0679http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.htmlhttps://www.debian.org/security/2019/dsa-4431https://seclists.org/bugtraq/2019/Apr/25https://access.redhat.com/errata/RHSA-2019:1175https://access.redhat.com/errata/RHSA-2019:1652https://access.redhat.com/errata/RHSA-2019:1791https://access.redhat.com/errata/RHSA-2019:1943https://access.redhat.com/errata/RHSA-2019:2399https://support.apple.com/kb/HT210609https://seclists.org/bugtraq/2019/Sep/49http://seclists.org/fulldisclosure/2019/Sep/42https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/https://nvd.nist.govhttps://www.debian.org/security/2019/dsa-4431https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10