CVE-2019-3857

Name
CVE-2019-3857
Description
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://www.libssh2.org/CVE-2019-3857.html
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3857
Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190327-0005/
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:0679
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
Third Party Advisory https://www.debian.org/security/2019/dsa-4431
Mailing List https://seclists.org/bugtraq/2019/Apr/25
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:1175
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:1652
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:1791
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:1943
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:2399
Patch https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:* libssh2 >= 1.2.8 <= 1.8.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status