Allele Security Alert
ASA-2019-00149
Identifier(s)
ASA-2019-00149, CVE-2019-3861
Title
Out-of-bounds reads with specially crafted SSH packets
Vendor(s)
The libssh2 project
Product(s)
libssh2
Affected version(s)
libssh2 versions 0.15 up to and including 1.8.0
Fixed version(s)
libssh2 1.8.1
Proof of concept
Unknown
Description
A server could send a specially crafted SSH packet with a padding length value greater than the packet length. This would result in a buffer read out of bounds when decompressing the packet or result in a corrupted packet value (CWE-130).
Technical details
Unknown
Credits
Chris Coulson (Canonical Ltd)
Reference(s)
libssh2 Security Advisory: CVE-2019-3861
https://www.libssh2.org/CVE-2019-3861.html
[SECURITY ADVISORIES] libssh2
https://seclists.org/oss-sec/2019/q1/184
Security fixes (#315) · libssh2/libssh2@dc109a7
https://github.com/libssh2/libssh2/commit/dc109a7f518757741590bb993c0c8412928ccec2
Security fixes by willco007 · Pull Request #315 · libssh2/libssh2
https://github.com/libssh2/libssh2/pull/315
CVE-2019-3861 - Red Hat Customer Portal
https://access.redhat.com/security/cve/CVE-2019-3861
CVE-2019-3861
https://security-tracker.debian.org/tracker/CVE-2019-3861
https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3861.html
CVE-2019-3861 | SUSE
https://www.suse.com/security/cve/CVE-2019-3861
CVE-2019-3861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861
CVE-2019-3861
https://nvd.nist.gov/vuln/detail/CVE-2019-3861
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: March 19, 2019