Skip to content

Latest commit

 

History

History
57 lines (37 loc) · 1.44 KB

CVE-2019-3855.md

File metadata and controls

57 lines (37 loc) · 1.44 KB

Possible integer overflow in transport read allows out-of-bounds write

Project libssh2 Security Advisory, March 18 2019 - Permalink

VULNERABILITY

A malicious server could send a specially crafted packet which could result in an unchecked integer overflow. The value would then be used to allocate memory causing a possible memory write out of bounds error (CWE-130).

There are no known exploits of this flaw at this time.

INFO

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2019-3855 to this issue.

AFFECTED VERSIONS

  • Affected versions: all versions to and including 1.8.0
  • Not affected versions: libssh2 >= 1.8.1

THE SOLUTION

libssh2 1.8.1 ensures packet length value is below LIBSSH2_PACKET_MAXPAYLOAD (4000 bytes) before processing payload.

A patch for this problem is available

RECOMMENDATIONS

We suggest you take one of the following actions immediately, in order of preference:

A - Upgrade to libssh2 1.8.1 or later

B - Apply the patch and rebuild libssh2

TIME LINE

It was first reported to the libssh2 project on Dec 3 2018 by Chris Coulson.

libssh2 1.8.1 as released on March 18 2019, coordinated with the publication of this advisory.

CREDITS

Reported by Chris Coulson of Canonical Ltd.