Your submission was sent successfully! Close

CVE-2019-3860

Published: 25 March 2019

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

From the Ubuntu security team

It was discovered that libssh2 incorrectly handled SFTP packets with empty payloads. A remote attacker could possibly use this issue to cause a denial of service or obtain sensitive information.

Priority

Medium

CVSS 3 base score: 9.1

Status

Package Release Status
libssh2
Launchpad, Ubuntu, Debian
bionic Needed

cosmic Ignored
(reached end-of-life)
disco Not vulnerable
(1.8.0-2.1)
eoan Not vulnerable
(1.8.0-2.1)
focal Not vulnerable
(1.8.0-2.1)
groovy Not vulnerable
(1.8.0-2.1)
hirsute Not vulnerable
(1.8.0-2.1)
impish Not vulnerable
(1.8.0-2.1)
jammy Not vulnerable
(1.8.0-2.1)
precise Does not exist

trusty Needed

upstream Needs triage

xenial Ignored
(end of standard support, was needed)