Vulnerability Description
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libssh2 | Libssh2 | < 1.8.1 |
| Debian | Debian Linux | 8.0 |
| Netapp | Ontap Select Deploy Administration Utility | - |
| Opensuse | Leap | 15.0 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.6 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Fedoraproject | Fedora | 28 |
| Oracle | Peoplesoft Enterprise Peopletools | 8.56 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.htmlThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0679Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1175Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1652Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1791Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1943Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2399Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3856Issue TrackingPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.htmlThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://seclists.org/bugtraq/2019/Apr/25Mailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20190327-0005/Third Party Advisory
- https://www.debian.org/security/2019/dsa-4431Third Party Advisory
- https://www.libssh2.org/CVE-2019-3856.htmlPatchVendor Advisory
FAQ
What is CVE-2019-3856?
CVE-2019-3856 is a vulnerability with a CVSS score of 8.8 (HIGH). An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH ser...
How severe is CVE-2019-3856?
CVE-2019-3856 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3856?
Check the references section above for vendor advisories and patch information. Affected products include: Libssh2 Libssh2, Debian Debian Linux, Netapp Ontap Select Deploy Administration Utility, Opensuse Leap, Redhat Enterprise Linux.