Out-of-bounds Write
Affecting libssh2 package, versions <1.4.3-4.1+deb8u2
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
References
- Bugtraq Mailing List
- Debian Security Advisory
- Debian Security Announcement
- Debian Security Tracker
- Fedora Security Update
- MISC
- MISC
- Netapp Security Advisory
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- RHSA Security Advisory
- RHSA Security Advisory
- RedHat Bugzilla Bug
- Ubuntu CVE Tracker
CVSS Score
8.8
high severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionRequired
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2019-3857
- CWE
- CWE-190 CWE-787
- Snyk ID
- SNYK-DEBIAN8-LIBSSH2-340752
- Disclosed
- 25 Mar, 2019
- Published
- 17 Mar, 2019