Описание
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | 1.8.0-2.1 |
| disco | not-affected | 1.8.0-2.1 |
| eoan | not-affected | 1.8.0-2.1 |
| esm-apps/bionic | needed | |
| esm-apps/focal | not-affected | 1.8.0-2.1 |
| esm-apps/jammy | not-affected | 1.8.0-2.1 |
| esm-apps/xenial | released | 1.5.0-2ubuntu0.1+esm1 |
| esm-infra-legacy/trusty | released | 1.4.3-2ubuntu0.2+esm2 |
Показывать по
EPSS
6.4 Medium
CVSS2
7.3 High
CVSS3
Связанные уязвимости
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in t ...
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
EPSS
6.4 Medium
CVSS2
7.3 High
CVSS3