CVE-2019-3861 log
| Source | 
							
  | 
					
| Severity | High | 
| Remote | Yes | 
| Type | Information disclosure | 
| Description | An issue has been found in libssh2 before 1.8.1 where a server could send a specially crafted SSH packet with a padding length value greater than the packet length. This would result in a buffer read out of bounds when decompressing the packet or result in a corrupted packet value.  | 
					
| Group | Package | Affected | Fixed | Severity | Status | Ticket | 
|---|---|---|---|---|---|---|
| AVG-926 | libssh2 | 1.8.0-3 | 1.8.1-1 | Critical | Fixed | 
| Date | Advisory | Group | Package | Severity | Type | 
|---|---|---|---|---|---|
| 22 Mar 2019 | ASA-201903-12 | AVG-926 | libssh2 | Critical | multiple issues | 
| References | 
|---|
https://www.libssh2.org/CVE-2019-3861.html https://libssh2.org/1.8.0-CVE/CVE-2019-3861.patch  |