Do your applications use this vulnerable package?
Test your applications
Overview
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
References
- Bugtraq Mailing List
- Bugtraq Mailing List
- CONFIRM
- Debian Security Advisory
- Debian Security Announcement
- Fedora Security Update
- Fedora Security Update
- MISC
- MISC
- MISC
- MISC
- Netapp Security Advisory
- OSS security Advisory
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- REDHAT
- RedHat Bugzilla Bug
- Security Focus
CVSS Score
9.1
high severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityNone
-
AvailabilityHigh
- Credit
- Unknown
- CVE
- CVE-2019-3862
- CWE
- CWE-125 CWE-130
- Snyk ID
- SNYK-ALPINE37-LIBSSH2-467483
- Disclosed
- 22 Sep, 2019
- Published
- 22 Sep, 2019