First published: Tue Nov 26 2024(Updated: )
CVE-2019-3858 An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. CVE-2019-3862 An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=8.2.0<=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000148713 is high due to the potential for Denial of Service and data exposure.
To fix F5-K000148713, upgrade your F5 BIG-IQ Centralized Management product to version 8.3.0 or higher.
F5-K000148713 addresses CVE-2019-3858 and CVE-2019-3862, which involve out of bounds read flaws.
F5-K000148713 affects users of F5 BIG-IQ Centralized Management versions between 8.2.0 and 8.3.0.
An attacker exploiting F5-K000148713 could potentially cause a Denial of Service or read sensitive client memory data.