CVE-2019-3859

Name
CVE-2019-3859
Description
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.libssh2.org/CVE-2019-3859.html
Mailing List https://seclists.org/bugtraq/2019/Mar/25
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859
Third Party Advisory http://www.securityfocus.com/bid/107485
Mailing List http://www.openwall.com/lists/oss-security/2019/03/18/3
Patch http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
Release Notes https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
Third Party Advisory https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
Mailing List https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190327-0005/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
Mailing List https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
Third Party Advisory https://www.debian.org/security/2019/dsa-4431
Mailing List https://seclists.org/bugtraq/2019/Apr/25
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
MLIST https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
MISC https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:* libssh2 >= None < 1.8.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status