Allele Security Alert
ASA-2019-00146
Identifier(s)
ASA-2019-00146, CVE-2019-3858
Title
Possible zero-byte allocation leading to an out-of-bounds read
Vendor(s)
The libssh2 project
Product(s)
libssh2
Affected version(s)
libssh2 versions 0.3 up to and including 1.8.0
Fixed version(s)
libssh2 1.8.1
Proof of concept
Unknown
Description
A server could send a specially crafted partial SFTP packet with a zero value for the payload length. This zero value would be used to then allocate memory resulting in a zero byte allocation and possible out of bounds read (CWE-130).
Technical details
Unknown
Credits
Chris Coulson (Canonical Ltd)
Reference(s)
libssh2 Security Advisory: CVE-2019-3858
https://www.libssh2.org/CVE-2019-3858.html
[SECURITY ADVISORIES] libssh2
https://seclists.org/oss-sec/2019/q1/184
Security fixes (#315) · libssh2/libssh2@dc109a7
https://github.com/libssh2/libssh2/commit/dc109a7f518757741590bb993c0c8412928ccec2
Security fixes by willco007 · Pull Request #315 · libssh2/libssh2
https://github.com/libssh2/libssh2/pull/315
CVE-2019-3858 - Red Hat Customer Portal
https://access.redhat.com/security/cve/CVE-2019-3858
CVE-2019-3858
https://security-tracker.debian.org/tracker/CVE-2019-3858
https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3858.html
CVE-2019-3858 | SUSE
https://www.suse.com/security/cve/CVE-2019-3858
CVE-2019-3858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858
CVE-2019-3858
https://nvd.nist.gov/vuln/detail/CVE-2019-3858
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: March 19, 2019