CVE-2019-3860

Name
CVE-2019-3860
Description
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://www.libssh2.org/CVE-2019-3860.html
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190327-0005/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
DEBIAN https://www.debian.org/security/2019/dsa-4431
BUGTRAQ https://seclists.org/bugtraq/2019/Apr/25
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
MLIST https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
MISC https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:* libssh2 >= 0.3 <= 1.8.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status