First published: Mon Oct 21 2019(Updated: )
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh2 Libssh2 | <=1.9.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Element Software | ||
Netapp Hci Management Node | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Solidfire | ||
Netapp Bootstrap Os | ||
Netapp Hci Compute Node |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-17498.
The severity of CVE-2019-17498 is high with a severity value of 8.1.
Libssh2 versions up to and including 1.9.0 are affected by CVE-2019-17498.
This vulnerability is caused by an integer overflow in the SSH_MSG_DISCONNECT logic, allowing an attacker to specify an arbitrary offset for a memory read.
A crafted SSH server may be able to disclose sensitive information or cause a denial-of-service condition.