First published: Mon Oct 21 2019(Updated: )
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libssh2 | <=1.9.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE | =15.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
NetApp Element Software | ||
netapp hci management node | ||
NetApp ONTAP Select Deploy | ||
netapp solidfire | ||
netapp bootstrap os | ||
netapp hci compute node |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-17498.
The severity of CVE-2019-17498 is high with a severity value of 8.1.
Libssh2 versions up to and including 1.9.0 are affected by CVE-2019-17498.
This vulnerability is caused by an integer overflow in the SSH_MSG_DISCONNECT logic, allowing an attacker to specify an arbitrary offset for a memory read.
A crafted SSH server may be able to disclose sensitive information or cause a denial-of-service condition.