Integer Overflow Flaw in libssh2 SSH Implementation
CVE-2019-3857
7.5HIGH
What is CVE-2019-3857?
The vulnerability in libssh2 arises from an integer overflow flaw in the parsing of SSH_MSG_CHANNEL_REQUEST packets that include an exit signal. This may lead to an out of bounds write, enabling a remote attacker controlling an SSH server to execute arbitrary code on a client system upon connection. Users are advised to update to the latest version to mitigate risk.
Affected Version(s)
libssh2 1.8.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
