Integer Overflow Flaw in libssh2 SSH Implementation
CVE-2019-3857

7.5HIGH

Key Information:

Status
Vendor
CVE Published:
25 March 2019

What is CVE-2019-3857?

The vulnerability in libssh2 arises from an integer overflow flaw in the parsing of SSH_MSG_CHANNEL_REQUEST packets that include an exit signal. This may lead to an out of bounds write, enabling a remote attacker controlling an SSH server to execute arbitrary code on a client system upon connection. Users are advised to update to the latest version to mitigate risk.

Affected Version(s)

libssh2 1.8.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

CVSS V3.0

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.