CVE-2019-3857
25.03.2019, 19:29
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.Enginsight
Vendor | Product | Version |
---|---|---|
libssh2 | libssh2 | 1.2.8 ≤ 𝑥 ≤ 1.8.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
netapp | ontap_select_deploy_administration_utility | - |
opensuse | leap | 15.0 |
opensuse | leap | 42.3 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 7.0 |
oracle | peoplesoft_enterprise_peopletools | 8.56 |
oracle | peoplesoft_enterprise_peopletools | 8.57 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
libssh2 |
|
References