6.4
CVSSv2

CVE-2019-3858

Published: 21/03/2019 Updated: 15/04/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

An out of bounds read flaw exists in libssh2 prior to 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Vulnerability Trend

Affected Products

Vendor Product Versions
Libssh2Libssh20.1, 0.3, 0.5, 0.6, 0.7, 0.8, 0.10, 0.11, 0.12, 0.13, 0.14, 0.15, 0.16, 0.17, 0.18, 1.0, 1.1, 1.2, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.3.0, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.5.0, 1.6.0, 1.7.0, 1.8.0
NetappOntap Select Deploy Administration Utility-
DebianDebian Linux8.0
FedoraprojectFedora29
OpensuseLeap15.0, 42.3

Vendor Advisories

Synopsis Moderate: libssh2 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for libssh2 is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sy ...
An issue has been found in libssh2 before 181 where a server could send a specially crafted partial SFTP packet with a zero value for the payload length This zero value would be used to then allocate memory resulting in a zero byte allocation and possible out of bounds read ...
Debian Bug report logs - #924965 libssh2: CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 Package: src:libssh2; Maintainer for src:libssh2 is Mikhail Gusarov <dottedmag@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: ...
Chris Coulson discovered several vulnerabilities in libssh2, a SSH2 client-side library, which could result in denial of service, information leaks or the execution of arbitrary code For the stable distribution (stretch), these problems have been fixed in version 170-1+deb9u1 We recommend that you upgrade your libssh2 packages For the detailed ...
An out of bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory (CVE-2019-3858 ) An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding ...
Arch Linux Security Advisory ASA-201903-13 ========================================== Severity: Critical Date : 2019-03-20 CVE-ID : CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 Package : libssh2 Type : multiple issues Remote : Yes Link : ...
Summary libssh2 is a client-side C library implementing the SSH2 protocol  It supports regular terminal, SCP and SFTP sessions; port forwarding, X11 forwarding; password, key-based and keyboard-interactive authentication Libssh2 releases security update for nine vulenrabilities on March 18, 2019 CVE-2019-3855: Possible integer overflow in ...

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] libssh2 (SSA:2019-077-01) New libssh2 packages are available for Slackware 142 and -current to fix security issues Here are the details from the Slackware 142 ChangeLog: +--------------------------+ patches/packages/libssh2-181-i586-1_slack142txz: Upgraded Fixed seve ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4431-1 security () debian org wwwdebianorg/security/ Salvatore Bonaccorso April 13, 2019 wwwdebianorg/security/faq ...
Hello! CVE-2019-3855 Possible integer overflow in transport read allows out-of-bounds write URL: wwwlibssh2org/CVE-2019-3855html Patch: libssh2org/180-CVE/CVE-2019-3855patch CVE-2019-3856 Possible integer overflow in keyboard interactive handling allows out-of-bounds write URL: wwwlibssh2org/CVE-2019-385 ...

Github Repositories

TrivyWeb A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI for Web TOC Installation RHEL/CentOS Debian/Ubuntu Mac OS X / Homebrew Binary (Including Windows) From source Examples Scan an image Scan an image file Save the results as JSON Filter the vulnerabilities by severities Filter the vulnerabilities by type Skip an update of vulnerability

A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI Accuracy Comparison The number of vulnerabilities detected on Alpine Linux (as of 2019/05/12) See Comparison with other scanners for details TOC Abstract Features Installation RHEL/CentOS Debian/Ubuntu Mac OS X / Homebrew Binary (Including Windows) From source Quick Start Basic Docker E

A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI TOC Abstract Features Installation RHEL/CentOS Debian/Ubuntu Arch Linux Mac OS X / Homebrew Binary (Including Windows) From source Quick Start Basic Docker Examples Scan an image Scan an image file Save the results as JSON Filter the vulnerabilities by severities Filter the vulnerabiliti

Scan Docker Image This script purpose is to scan Docker images for vulnerabilities Get a token: microscanneraquaseccom/signup Usage: SCANNER_TOKEN=<TOKEN> SCANNER_IMAGE=jboss/keycloak:601 /docker-scansh --silent Sample output: { "scan_started": { "seconds": 1563490473, "nanos": 733846066 }, "scan_dura