An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2019-03-21 09:01
Updated : 2019-04-15 05:31
NVD link : CVE-2019-3862
Mitre link : CVE-2019-3862
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
libssh2
- libssh2
fedoraproject
- fedora
netapp
- ontap_select_deploy_administration_utility
opensuse
- leap
debian
- debian_linux