CVE-2019-3859 log
| Source |
|
| Severity | High |
| Remote | Yes |
| Type | Information disclosure |
| Description | An issue has been found in libssh2 before 1.8.1 where a server could send a specially crafted partial packet in response to various commands such as: sha1 and sha226 key exchange, user auth list, user auth password response, public key auth response, channel startup/open/forward/ setenv/request pty/x11 and session start up. The result would be a memory out of bounds read. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-926 | libssh2 | 1.8.0-3 | 1.8.1-1 | Critical | Fixed |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 22 Mar 2019 | ASA-201903-12 | AVG-926 | libssh2 | Critical | multiple issues |
| References |
|---|
https://www.libssh2.org/CVE-2019-3859.html https://libssh2.org/1.8.0-CVE/CVE-2019-3859.patch |