Описание
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
cosmic | ignored | end of life |
devel | not-affected | 1.8.0-2.1 |
disco | not-affected | 1.8.0-2.1 |
eoan | not-affected | 1.8.0-2.1 |
esm-apps/bionic | needed | |
esm-apps/focal | not-affected | 1.8.0-2.1 |
esm-apps/jammy | not-affected | 1.8.0-2.1 |
esm-apps/xenial | released | 1.5.0-2ubuntu0.1+esm1 |
esm-infra-legacy/trusty | not-affected | 1.4.3-2ubuntu0.2+esm2 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
An integer overflow flaw which could lead to an out of bounds write wa ...
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Уязвимость команды SSH_MSG_CHANNEL_REQUEST библиотеки libssh2, позволяющая нарушителю выполнить произвольный код
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3