CVE-2019-3863

Name
CVE-2019-3863
Description
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://www.libssh2.org/CVE-2019-3863.html
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3863
Mailing List https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190327-0005/
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:0679
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
DEBIAN https://www.debian.org/security/2019/dsa-4431
BUGTRAQ https://seclists.org/bugtraq/2019/Apr/25
REDHAT https://access.redhat.com/errata/RHSA-2019:1175
REDHAT https://access.redhat.com/errata/RHSA-2019:1652
REDHAT https://access.redhat.com/errata/RHSA-2019:1791
REDHAT https://access.redhat.com/errata/RHSA-2019:1943
REDHAT https://access.redhat.com/errata/RHSA-2019:2399
MISC https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:* libssh2 >= None < 1.8.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status