Description
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1730-3 | libssh2 regression update |
Debian DLA |
DLA-2848-1 | libssh2 security update |
Debian DLA |
DLA-3559-1 | libssh2 security update |
Ubuntu USN |
USN-5308-1 | libssh2 vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
F5
Subscribe
Traffix Systems Signaling Delivery Controller
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Libssh2
Subscribe
Libssh2
Subscribe
Netapp
Subscribe
Cloud Backup
Subscribe
E-series Santricity Os Controller
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:41:10.457Z
Reserved: 2019-06-30T00:00:00.000Z
Link: CVE-2019-13115
No data.
Status : Modified
Published: 2019-07-16T18:15:13.287
Modified: 2024-11-21T04:24:13.313
Link: CVE-2019-13115
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN