First published: Tue Jul 16 2019(Updated: )
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh2 Libssh2 | <1.9.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Netapp Cloud Backup | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.70.1 | |
NetApp ONTAP Select Deploy administration utility | ||
F5 Traffix Systems Signaling Delivery Controller | >=5.0.0<=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-13115.
The severity of CVE-2019-13115 is high with a CVSS score of 8.1.
CVE-2019-13115 affects Libssh2 versions before 1.9.0 and could lead to an out-of-bounds read in the way packets are read from the server, potentially disclosing sensitive information.
CVE-2019-13115 affects Libssh2 versions before 1.9.0, Debian Linux versions 8.0 and 9.0, Fedora versions 29 and 30, Netapp Cloud Backup, NetApp E-Series SANtricity OS Controller versions between 11.0.0 and 11.70.1, and NetApp ONTAP Select Deploy administration utility.
To fix CVE-2019-13115, it is recommended to update to Libssh2 version 1.9.0 or later.