Vulnerability Description
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libssh2 | Libssh2 | < 1.9.0 |
| Debian | Debian Linux | 8.0 |
| Fedoraproject | Fedora | 29 |
| Netapp | Cloud Backup | - |
| Netapp | E-Series Santricity Os Controller | >= 11.0.0, <= 11.70.1 |
| Netapp | Ontap Select Deploy Administration Utility | - |
| F5 | Traffix Systems Signaling Delivery Controller | >= 5.0.0, <= 5.1.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.htm
- https://blog.semmle.com/libssh2-integer-overflow/ExploitThird Party Advisory
- https://github.com/libssh2/libssh2/compare/02ecf17...42d37aaThird Party Advisory
- https://github.com/libssh2/libssh2/pull/350Issue TrackingThird Party Advisory
- https://libssh2.org/changes.htmlRelease NotesVendor Advisory
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e3
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8
- https://lists.debian.org/debian-lts-announce/2019/07/msg00024.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/12/msg00013.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20190806-0002/Third Party Advisory
- https://support.f5.com/csp/article/K13322484Third Party Advisory
- https://support.f5.com/csp/article/K13322484?utm_source=f5support&%3Butm_medi
FAQ
What is CVE-2019-13115?
CVE-2019-13115 is a vulnerability with a CVSS score of 8.1 (HIGH). In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the ser...
How severe is CVE-2019-13115?
CVE-2019-13115 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13115?
Check the references section above for vendor advisories and patch information. Affected products include: Libssh2 Libssh2, Debian Debian Linux, Fedoraproject Fedora, Netapp Cloud Backup, Netapp E-Series Santricity Os Controller.