Latest libssh2 libssh2 Vulnerabilities

Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
pip/paramiko>=2.5.0<3.4.0
go/golang.org/x/crypto<0.17.0
rust/russh<0.40.2
Apple macOS Sonoma<14.4
Openbsd Openssh<9.6
Putty Putty<0.80
and 128 more
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
IBM QRadar SIEM<=7.5 - 7.5.0 UP7
Libssh2 Libssh2=1.10.0
redhat/libssh2<1.10.0
redhat/libssh2<1.11.0
debian/libssh2<=1.8.0-2.1<=1.9.0-2
ubuntu/libssh2<1.8.0-1ubuntu0.1
and 3 more
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a su...
Libssh2 Libssh2<=1.9.0
Fedoraproject Fedora=30
Fedoraproject Fedora=31
openSUSE Leap=15.1
Debian Debian Linux=8.0
Debian Debian Linux=9.0
and 7 more
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the ser...
Libssh2 Libssh2<1.9.0
Debian Debian Linux=8.0
Debian Debian Linux=9.0
Fedoraproject Fedora=29
Fedoraproject Fedora=30
Netapp Cloud Backup
and 3 more
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial o...
debian/libssh2
Libssh2 Libssh2>=0.3<=1.8.0
Debian Debian Linux=8.0
NetApp ONTAP Select Deploy administration utility
openSUSE Leap=15.0
openSUSE Leap=42.3
An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause ...
debian/libssh2
Libssh2 Libssh2<1.8.1
Fedoraproject Fedora=29
Debian Debian Linux=8.0
NetApp ONTAP Select Deploy administration utility
openSUSE Leap=15.0
and 1 more
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a ...
debian/libssh2
Libssh2 Libssh2<1.8.1
Fedoraproject Fedora=29
Debian Debian Linux=8.0
NetApp ONTAP Select Deploy administration utility
openSUSE Leap=42.3
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to c...
debian/libssh2
Libssh2 Libssh2<1.8.1
Fedoraproject Fedora=28
Fedoraproject Fedora=29
Debian Debian Linux=8.0
Debian Debian Linux=9.0
and 3 more
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as ...
Libssh2 Libssh2<1.8.1
Debian Debian Linux=8.0
NetApp ONTAP Select Deploy administration utility
openSUSE Leap=15.0
openSUSE Leap=42.3
Redhat Enterprise Linux Desktop=7.0
and 6 more
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker ...
Libssh2 Libssh2>=1.2.8<=1.8.0
Debian Debian Linux=8.0
Debian Debian Linux=9.0
NetApp ONTAP Select Deploy administration utility
openSUSE Leap=15.0
openSUSE Leap=42.3
and 11 more
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH ser...
redhat/libssh2<1.8.1
debian/libssh2
Libssh2 Libssh2<1.8.1
Debian Debian Linux=8.0
Debian Debian Linux=9.0
NetApp ONTAP Select Deploy administration utility
and 12 more
IDE SCM. Multiple issues were addressed by updating to version 2.16.
redhat/libssh2<1.8.1
debian/libssh2<=1.8.0-2<=1.4.3-4.1+deb8u1<=1.4.3-1<=1.7.0-1
Apple Xcode<11.0
debian/libssh2
Libssh2 Libssh2<1.8.1
Fedoraproject Fedora=28
and 16 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203