First published: Tue Aug 22 2023(Updated: )
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh2 Libssh2 | =1.10.0 | |
redhat/libssh2 | <1.10.0 | 1.10.0 |
redhat/libssh2 | <1.11.0 | 1.11.0 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP7 | |
ubuntu/libssh2 | <1.8.0-1ubuntu0.1 | 1.8.0-1ubuntu0.1 |
ubuntu/libssh2 | <1.8.0-2.1ubuntu0.1 | 1.8.0-2.1ubuntu0.1 |
ubuntu/libssh2 | <1.4.3-2ubuntu0.2+ | 1.4.3-2ubuntu0.2+ |
ubuntu/libssh2 | <1.5.0-2ubuntu0.1+ | 1.5.0-2ubuntu0.1+ |
debian/libssh2 | <=1.8.0-2.1<=1.9.0-2 | 1.8.0-2.1+deb10u1 1.10.0-3 1.11.0-4 |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.4 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | |
F5 F5OS-A | =1.5.0=1.4.0>=1.3.0<=1.3.2 | 1.7.01.5.2 |
F5 F5OS-C | =1.6.0>=1.5.0<=1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-22218 is a vulnerability in libssh2 1.10.0 that allows attackers to access out-of-bounds memory.
CVE-2020-22218 has a severity rating of 7.5 (high).
CVE-2020-22218 affects libssh2 1.10.0, ubuntu/libssh2 1.4.3-2ubuntu0.2+, ubuntu/libssh2 1.5.0-2ubuntu0.1+, ubuntu/libssh2 1.8.0-1ubuntu0.1, ubuntu/libssh2 1.8.0-2.1ubuntu0.1, and debian/libssh2 1.8.0-2.1+deb10u1, 1.10.0-3, and 1.11.0-2.
To fix CVE-2020-22218, update to a version of libssh2 that is not affected by the vulnerability.
You can find more information about CVE-2020-22218 at the following references: [GitHub](https://github.com/libssh2/libssh2/pull/476), [Debian LTS](https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html), [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218).