First published: Mon Mar 11 2019(Updated: )
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh2 Libssh2 | <1.8.1 | |
Debian Debian Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/libssh2 | 1.8.0-2.1 1.8.0-2.1+deb10u1 1.9.0-2 1.10.0-3 1.11.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3863 is a vulnerability found in libssh2 before version 1.8.1.
CVE-2019-3863 has a severity rating of 8.8 (high).
To fix CVE-2019-3863, update libssh2 to version 1.8.1 or later.
The software affected by CVE-2019-3863 includes libssh2, Debian Linux, NetApp ONTAP Select Deploy administration utility, openSUSE Leap, and Redhat Enterprise Linux.
More information about CVE-2019-3863 can be found at the following links: [Link 1](https://github.com/libssh2/libssh2/commit/dc109a7f518757741590bb993c0c8412928ccec2), [Link 2](https://www.openwall.com/lists/oss-security/2019/03/18/3), [Link 3](https://libssh2.org/1.8.0-CVE/CVE-2019-3863.txt)