CVE-2019-3860
Name
CVE-2019-3860
Description
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
NVD Severity
high
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
Patch
https://www.libssh2.org/CVE-2019-3860.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190327-0005/
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
FEDORA
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
DEBIAN
https://www.debian.org/security/2019/dsa-4431
BUGTRAQ
https://seclists.org/bugtraq/2019/Apr/25
SUSE
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
MLIST
https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
MISC
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*
libssh2
>= 0.3
<= 1.8.0
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status