In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
2019-10-21T22:15:10.523
2024-11-21T04:32:22.850
Modified
CVSSv3.1: 8.1 (HIGH)
AV:N/AC:M/Au:N/C:P/I:N/A:P
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | libssh2 | libssh2 | ≤ 1.9.0 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | fedoraproject | fedora | 31 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | element_software | - | Yes |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | ontap_select_deploy_administration_utility | - | Yes |
Application | netapp | solidfire | - | Yes |
Operating System | netapp | bootstrap_os | - | Yes |
Hardware | netapp | hci_compute_node | - | No |