Memory Corruption Flaw in Libssh2 Affects Multiple Platforms
CVE-2019-3863

7.5HIGH

Key Information:

Status
Vendor
CVE Published:
25 March 2019

What is CVE-2019-3863?

A vulnerability in libssh2 versions prior to 1.8.1 allows a server to exploit a flaw where multiple keyboard interactive response messages can exceed the maximum length determined by an unsigned char. This situation can lead to an out of bounds memory write, potentially enabling an attacker to execute arbitrary code or crash the application.

Affected Version(s)

libssh2 1.8.1

References

EPSS Score

8% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

CVSS V3.0

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.