Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3860

Опубликовано: 25 мар. 2019
Источник: debian
EPSS Низкий

Описание

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libssh2fixed1.8.0-2.1package

Примечания

  • https://libssh2.org/CVE-2019-3860.html

  • Patch: https://libssh2.org/1.8.0-CVE/CVE-2019-3860.patch

  • https://github.com/libssh2/libssh2/pull/316

EPSS

Процентиль: 74%
0.00813
Низкий

Связанные уязвимости

CVSS3: 5
ubuntu
почти 7 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

CVSS3: 5
redhat
почти 7 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

CVSS3: 5
nvd
почти 7 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

suse-cvrf
больше 6 лет назад

Security update for libssh2_org

suse-cvrf
больше 6 лет назад

Security update for libssh2_org

EPSS

Процентиль: 74%
0.00813
Низкий