Описание
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | 1.8.0-2.1 |
| disco | not-affected | 1.8.0-2.1 |
| eoan | not-affected | 1.8.0-2.1 |
| esm-apps/bionic | needed | |
| esm-apps/focal | not-affected | 1.8.0-2.1 |
| esm-apps/jammy | not-affected | 1.8.0-2.1 |
| esm-apps/xenial | released | 1.5.0-2ubuntu0.1+esm1 |
| esm-infra-legacy/trusty | released | 1.4.3-2ubuntu0.2+esm2 |
Показывать по
6.4 Medium
CVSS2
5 Medium
CVSS3
Связанные уязвимости
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in t ...
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
Уязвимость библиотеки libssh2, связанная с ошибками обработки несоответствия параметра длины, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации
6.4 Medium
CVSS2
5 Medium
CVSS3