Allele Security Alert
Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev
The libssh2 project
libssh2 versions 0.1 up to and including 1.8.0
Proof of concept
A server could send a specially crafted partial packet in response to various commands such as: sha1 and sha226 key exchange, user auth list, user auth password response, public key auth response, channel startup/open/forward/ setenv/request pty/x11 and session start up. The result would be a memory out of bounds read (CWE-130).
Chris Coulson (Canonical Ltd)
libssh2 Security Advisory: CVE-2019-3859
[SECURITY ADVISORIES] libssh2
Security fixes (#315) · libssh2/libssh2@dc109a7
Security fixes by willco007 · Pull Request #315 · libssh2/libssh2
CVE-2019-3859 - Red Hat Customer Portal
CVE-2019-3859 | SUSE
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: March 19, 2019