Allele Security Alert
ASA-2019-00145
Identifier(s)
ASA-2019-00145, CVE-2019-3857
Title
Possible integer overflow leading to zero-byte allocation and out-of-bounds write
Vendor(s)
The libssh2 project
Product(s)
libssh2
Affected version(s)
libssh2 versions 1.2.8 up to and including 1.8.0
Fixed version(s)
libssh2 1.8.1
Proof of concept
Unknown
Description
A server could send a SSH_MSG_CHANNEL_REQUEST packet with an exit signal message with a length of max unsigned integer value. The length would then have a value of 1 added to it and used to allocate memory causing a possible memory write out of bounds error or zero byte allocation (CWE-130).
Technical details
Unknown
Credits
Chris Coulson (Canonical Ltd)
Reference(s)
libssh2 Security Advisory: CVE-2019-3857
https://www.libssh2.org/CVE-2019-3857.html
[SECURITY ADVISORIES] libssh2
https://seclists.org/oss-sec/2019/q1/184
Security fixes (#315) · libssh2/libssh2@dc109a7
https://github.com/libssh2/libssh2/commit/dc109a7f518757741590bb993c0c8412928ccec2
Security fixes by willco007 · Pull Request #315 · libssh2/libssh2
https://github.com/libssh2/libssh2/pull/315
CVE-2019-3857 - Red Hat Customer Portal
https://access.redhat.com/security/cve/CVE-2019-3857
CVE-2019-3857
https://security-tracker.debian.org/tracker/CVE-2019-3857
https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3857.html
CVE-2019-3857 | SUSE
https://www.suse.com/security/cve/CVE-2019-3857
CVE-2019-3857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857
CVE-2019-3857
https://nvd.nist.gov/vuln/detail/CVE-2019-3857
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: March 19, 2019