Allele Security Alert
ASA-2019-00148
Identifier(s)
ASA-2019-00148, CVE-2019-3860
Title
Out-of-bounds reads with specially crafted SFTP packets
Vendor(s)
The libssh2 project
Product(s)
libssh2
Affected version(s)
libssh2 versions 0.3 up to and including 1.8.0
Fixed version(s)
libssh2 1.8.1
Proof of concept
Unknown
Description
A server could send a specially crafted partial SFTP packet with a empty payload in response to various SFTP commands such as read directory, file status, status vfs and symlink. The result would be a memory out of bounds read (CWE-130).
Technical details
Unknown
Credits
Chris Coulson (Canonical Ltd)
Reference(s)
libssh2 Security Advisory: CVE-2019-3860
https://www.libssh2.org/CVE-2019-3860.html
[SECURITY ADVISORIES] libssh2
https://seclists.org/oss-sec/2019/q1/184
Security fixes (#315) · libssh2/libssh2@dc109a7
https://github.com/libssh2/libssh2/commit/dc109a7f518757741590bb993c0c8412928ccec2
Security fixes by willco007 · Pull Request #315 · libssh2/libssh2
https://github.com/libssh2/libssh2/pull/315
CVE-2019-3860 - Red Hat Customer Portal
https://access.redhat.com/security/cve/CVE-2019-3860
CVE-2019-3860
https://security-tracker.debian.org/tracker/CVE-2019-3860
https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3860.html
CVE-2019-3860 | SUSE
https://www.suse.com/security/cve/CVE-2019-3860
CVE-2019-3860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860
CVE-2019-3860
https://nvd.nist.gov/vuln/detail/CVE-2019-3860
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: March 19, 2019