Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3857

Опубликовано: 13 мар. 2019
Источник: redhat
CVSS3: 7.5

Описание

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

Отчет

This flaw was present in libssh2 packages included in Red Hat Virtualization Hypervisor and Management Appliance, however libssh2 in these hosts is never exposed to malicious clients or servers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:8.0.0/libssh2Affected
Red Hat Virtualization 4redhat-virtualization-hostWill not fix
Red Hat Virtualization 4rhvm-applianceWill not fix
Red Hat Enterprise Linux 6libssh2FixedRHSA-2019:165202.07.2019
Red Hat Enterprise Linux 7libssh2FixedRHSA-2019:067928.03.2019
Red Hat Enterprise Linux 7.3 Advanced Update Supportlibssh2FixedRHSA-2019:239907.08.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update Supportlibssh2FixedRHSA-2019:239907.08.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP Solutionslibssh2FixedRHSA-2019:239907.08.2019
Red Hat Enterprise Linux 7.4 Extended Update Supportlibssh2FixedRHSA-2019:194330.07.2019
Red Hat Enterprise Linux 7.5 Extended Update Supportlibssh2FixedRHSA-2019:179116.07.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1687305libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CVSS3: 8.8
nvd
около 6 лет назад

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CVSS3: 8.8
debian
около 6 лет назад

An integer overflow flaw which could lead to an out of bounds write wa ...

CVSS3: 8.8
github
около 3 лет назад

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CVSS3: 8.8
fstec
больше 6 лет назад

Уязвимость команды SSH_MSG_CHANNEL_REQUEST библиотеки libssh2, позволяющая нарушителю выполнить произвольный код

7.5 High

CVSS3