6.4
CVSSv2

CVE-2019-3859

Published: 21/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 572
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

An out of bounds read flaw exists in libssh2 prior to 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libssh2 libssh2

fedoraproject fedora 28

fedoraproject fedora 29

debian debian linux 8.0

debian debian linux 9.0

netapp ontap select deploy administration utility -

opensuse leap 42.3

opensuse leap 15.0

Vendor Advisories

Debian Bug report logs - #924965 libssh2: CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 Package: src:libssh2; Maintainer for src:libssh2 is Mikhail Gusarov <dottedmag@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: ...
Chris Coulson discovered several vulnerabilities in libssh2, a SSH2 client-side library, which could result in denial of service, information leaks or the execution of arbitrary code For the stable distribution (stretch), these problems have been fixed in version 170-1+deb9u1 We recommend that you upgrade your libssh2 packages For the detailed ...
An out of bounds read flaw was discovered in libssh2 before 181 in the _libssh2_packet_require and _libssh2_packet_requirev functions A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory (CVE-2019-3859) An out of bounds read flaw was discovered in libssh2 before 181 in the w ...
An out of bounds read flaw was discovered in libssh2 before 181 in the _libssh2_packet_require and _libssh2_packet_requirev functions A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory (CVE-2019-3859) An out of bounds read flaw was discovered in libssh2 before 181 in the w ...
An issue has been found in libssh2 before 181 where a server could send a specially crafted partial packet in response to various commands such as: sha1 and sha226 key exchange, user auth list, user auth password response, public key auth response, channel startup/open/forward/ setenv/request pty/x11 and session start up The result would be a me ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [SECURITY ADVISORIES] libssh2 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Stenberg &lt;daniel () haxx ...

References

CWE-125https://www.libssh2.org/CVE-2019-3859.htmlhttps://seclists.org/bugtraq/2019/Mar/25https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859http://www.securityfocus.com/bid/107485http://www.openwall.com/lists/oss-security/2019/03/18/3http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.htmlhttps://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767https://lists.debian.org/debian-lts-announce/2019/03/msg00032.htmlhttps://security.netapp.com/advisory/ntap-20190327-0005/http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.htmlhttps://lists.debian.org/debian-lts-announce/2019/04/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.htmlhttps://www.debian.org/security/2019/dsa-4431https://seclists.org/bugtraq/2019/Apr/25http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.htmlhttps://lists.debian.org/debian-lts-announce/2019/07/msg00024.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924965https://nvd.nist.govhttps://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10https://www.debian.org/security/2019/dsa-4431