CVE-2019-3856
Published: 25 March 2019
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
From the Ubuntu security team
It was discovered that libssh2 incorrectly handled prompt requests. A remote attacker could possibly use this issue to execute arbitrary code.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
libssh2 Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Not vulnerable
(1.8.0-2.1)
|
|
eoan |
Not vulnerable
(1.8.0-2.1)
|
|
focal |
Not vulnerable
(1.8.0-2.1)
|
|
groovy |
Not vulnerable
(1.8.0-2.1)
|
|
hirsute |
Not vulnerable
(1.8.0-2.1)
|
|
impish |
Not vulnerable
(1.8.0-2.1)
|
|
jammy |
Not vulnerable
(1.8.0-2.1)
|
|
precise |
Does not exist
|
|
trusty |
Needed
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(end of standard support, was needed)
|