572
VMScore

CVE-2019-3861

Published: 25/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 572
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

An out of bounds read flaw exists in libssh2 prior to 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libssh2 libssh2

debian debian linux 8.0

netapp ontap select deploy administration utility -

opensuse leap 42.3

opensuse leap 15.0

Vendor Advisories

Synopsis Moderate: libssh2 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for libssh2 is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sy ...
Debian Bug report logs - #924965 libssh2: CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 Package: src:libssh2; Maintainer for src:libssh2 is Mikhail Gusarov <dottedmag@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: ...
Chris Coulson discovered several vulnerabilities in libssh2, a SSH2 client-side library, which could result in denial of service, information leaks or the execution of arbitrary code For the stable distribution (stretch), these problems have been fixed in version 170-1+deb9u1 We recommend that you upgrade your libssh2 packages For the detailed ...
An out of bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory (CVE-2019-3858) An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding l ...
An issue has been found in libssh2 before 181 where a server could send a specially crafted SSH packet with a padding length value greater than the packet length This would result in a buffer read out of bounds when decompressing the packet or result in a corrupted packet value ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [SECURITY ADVISORIES] libssh2 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Stenberg &lt;daniel () haxx ...