Vulnerability CVE-2019-3855: Information

Description

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Published: March 22, 2019
Modified: Nov. 7, 2023
Error type identifier: CWE-787CWE-190

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.libssh2.org/CVE-2019-3855.html
  • Patch
  • Vendor Advisory
20190319 [slackware-security] libssh2 (SSA:2019-077-01)
  • Mailing List
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855
  • Issue Tracking
  • Patch
  • Third Party Advisory
107485
  • Third Party Advisory
  • VDB Entry
[oss-security] 20190318 [SECURITY ADVISORIES] libssh2
  • Mailing List
  • Patch
  • Third Party Advisory
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
  • Third Party Advisory
  • VDB Entry
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
  • Third Party Advisory
[debian-lts-announce] 20190326 [SECURITY] [DLA 1730-1] libssh2 security update
  • Mailing List
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20190327-0005/
  • Third Party Advisory
RHSA-2019:0679
  • Third Party Advisory
openSUSE-SU-2019:1075
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2019:1109
  • Third Party Advisory
DSA-4431
  • Third Party Advisory
20190415 [SECURITY] [DSA 4431-1] libssh2 security update
  • Mailing List
  • Third Party Advisory
RHSA-2019:1175
  • Third Party Advisory
RHSA-2019:1652
  • Third Party Advisory
RHSA-2019:1791
  • Third Party Advisory
RHSA-2019:1943
  • Third Party Advisory
RHSA-2019:2399
  • Third Party Advisory
https://support.apple.com/kb/HT210609
  • Third Party Advisory
20190927 APPLE-SA-2019-9-26-7 Xcode 11.0
  • Mailing List
  • Third Party Advisory
20190927 APPLE-SA-2019-9-26-7 Xcode 11.0
  • Mailing List
  • Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
  • Patch
  • Third Party Advisory
FEDORA-2019-f31c14682f
    FEDORA-2019-3348cb4934
      FEDORA-2019-9d85600fc7
        FEDORA-2019-5885663621
            1. Configuration 1

              cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*
              End excliding
              1.8.1

              Configuration 2

              cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*

              cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

              cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

              Configuration 3

              cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

              cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

              Configuration 4

              cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

              Configuration 5

              cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

              cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

              cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

              cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

              cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

              cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

              cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*

              Configuration 6

              cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

              Configuration 7

              cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*
              End excliding
              11.0

              Configuration 8

              cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*

              cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*