CVE-2019-3859

CRITICAL

Libssh2 < 1.8.1 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

References (20)

Core 20
Core References
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2019/03/18/3
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Mar/25
Vendor Advisory x_refsource_misc
https://www.libssh2.org/CVE-2019-3859.html
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/107485
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190327-0005/
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2019/dsa-4431
Mailing List, Third Party Advisory mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Apr/25
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html

Scores

CVSS v3 9.1
EPSS 0.0118
EPSS Percentile 78.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (8)
debian/debian_linux 8.0
debian/debian_linux 9.0
fedoraproject/fedora 28
fedoraproject/fedora 29
libssh2/libssh2 < 1.8.1
netapp/ontap_select_deploy_administration_utility
opensuse/leap 15.0
opensuse/leap 42.3
Published Mar 21, 2019
Tracked Since Feb 18, 2026