[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1254 --- libssh2

ID: oval:org.secpod.oval:def:1601039Date: (C)2019-08-13   (M)2023-11-10
Class: PATCHFamily: unix




An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.

Platform:
Amazon Linux AMI
Product:
libssh2
Reference:
ALAS-2019-1254
CVE-2019-3855
CVE-2019-3857
CVE-2019-3856
CVE-2019-3863
CVE    4
CVE-2019-3857
CVE-2019-3856
CVE-2019-3855
CVE-2019-3863
...

© SecPod Technologies