Allele Security Alert
ASA-2019-00147
Identifier(s)
ASA-2019-00147, CVE-2019-3859
Title
Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev
Vendor(s)
The libssh2 project
Product(s)
libssh2
Affected version(s)
libssh2 versions 0.1 up to and including 1.8.0
Fixed version(s)
libssh2 1.8.1
Proof of concept
Unknown
Description
A server could send a specially crafted partial packet in response to various commands such as: sha1 and sha226 key exchange, user auth list, user auth password response, public key auth response, channel startup/open/forward/ setenv/request pty/x11 and session start up. The result would be a memory out of bounds read (CWE-130).
Technical details
Unknown
Credits
Chris Coulson (Canonical Ltd)
Reference(s)
libssh2 Security Advisory: CVE-2019-3859
https://www.libssh2.org/CVE-2019-3859.html
[SECURITY ADVISORIES] libssh2
https://seclists.org/oss-sec/2019/q1/184
Security fixes (#315) · libssh2/libssh2@dc109a7
https://github.com/libssh2/libssh2/commit/dc109a7f518757741590bb993c0c8412928ccec2
Security fixes by willco007 · Pull Request #315 · libssh2/libssh2
https://github.com/libssh2/libssh2/pull/315
CVE-2019-3859 - Red Hat Customer Portal
https://access.redhat.com/security/cve/CVE-2019-3859
CVE-2019-3859
https://security-tracker.debian.org/tracker/CVE-2019-3859
https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3859.html
CVE-2019-3859 | SUSE
https://www.suse.com/security/cve/CVE-2019-3859
CVE-2019-3859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859
CVE-2019-3859
https://nvd.nist.gov/vuln/detail/CVE-2019-3859
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: March 19, 2019