Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3861

Опубликовано: 25 мар. 2019
Источник: debian
EPSS Низкий

Описание

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libssh2fixed1.8.0-2.1package

Примечания

  • https://libssh2.org/CVE-2019-3861.html

  • Patch: https://libssh2.org/1.8.0-CVE/CVE-2019-3861.patch

  • https://github.com/libssh2/libssh2/pull/316

EPSS

Процентиль: 81%
0.01576
Низкий

Связанные уязвимости

CVSS3: 5
ubuntu
почти 7 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

CVSS3: 5
redhat
почти 7 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

CVSS3: 5
nvd
почти 7 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

CVSS3: 9.1
github
больше 3 лет назад

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

CVSS3: 9.1
fstec
около 7 лет назад

Уязвимость библиотеки libssh2, связанная с ошибками обработки несоответствия параметра длины, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 81%
0.01576
Низкий