cpe:/a:libssh2:libssh2:0.1 cpe:/a:libssh2:libssh2:0.3 cpe:/a:libssh2:libssh2:0.5 cpe:/a:libssh2:libssh2:0.6 cpe:/a:libssh2:libssh2:0.7 cpe:/a:libssh2:libssh2:0.8 cpe:/a:libssh2:libssh2:0.10 cpe:/a:libssh2:libssh2:0.11 cpe:/a:libssh2:libssh2:0.12 cpe:/a:libssh2:libssh2:0.13 cpe:/a:libssh2:libssh2:0.14 cpe:/a:libssh2:libssh2:0.15 cpe:/a:libssh2:libssh2:0.16 cpe:/a:libssh2:libssh2:0.17 cpe:/a:libssh2:libssh2:0.18 cpe:/a:libssh2:libssh2:1.0 cpe:/a:libssh2:libssh2:1.1 cpe:/a:libssh2:libssh2:1.2 cpe:/a:libssh2:libssh2:1.2.1 cpe:/a:libssh2:libssh2:1.2.2 cpe:/a:libssh2:libssh2:1.2.3 cpe:/a:libssh2:libssh2:1.2.4 cpe:/a:libssh2:libssh2:1.2.5 cpe:/a:libssh2:libssh2:1.2.6 cpe:/a:libssh2:libssh2:1.2.7 cpe:/a:libssh2:libssh2:1.2.8 cpe:/a:libssh2:libssh2:1.2.9 cpe:/a:libssh2:libssh2:1.3.0 cpe:/a:libssh2:libssh2:1.4.0 cpe:/a:libssh2:libssh2:1.4.1 cpe:/a:libssh2:libssh2:1.4.2 cpe:/a:libssh2:libssh2:1.4.3 cpe:/a:libssh2:libssh2:1.5.0 cpe:/a:libssh2:libssh2:1.6.0 cpe:/a:libssh2:libssh2:1.7.0 cpe:/a:libssh2:libssh2:1.8.0 cpe:/a:netapp:ontap_select_deploy_administration_utility:- cpe:/o:debian:debian_linux:8.0 cpe:/o:opensuse:leap:15.0 cpe:/o:opensuse:leap:42.3 cpe:/o:redhat:enterprise_linux_desktop:7.0 cpe:/o:redhat:enterprise_linux_server:7.0 cpe:/o:redhat:enterprise_linux_server_aus:7.6 cpe:/o:redhat:enterprise_linux_server_eus:7.6 cpe:/o:redhat:enterprise_linux_server_tus:7.6 cpe:/o:redhat:enterprise_linux_workstation:7.0 CVE-2019-3856 2019-03-25T15:29:01.790-04:00 2019-05-14T17:29:02.810-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov BUGTRAQ 20190415 [SECURITY] [DSA 4431-1] libssh2 security update DEBIAN DSA-4431 FEDORA FEDORA-2019-3348cb4934 REDHAT RHSA-2019:0679 REDHAT RHSA-2019:1175 REDHAT RHSA-2019:1652 REDHAT RHSA-2019:1791 REDHAT RHSA-2019:1943 REDHAT RHSA-2019:2399 MLIST [debian-lts-announce] 20190326 [SECURITY] [DLA 1730-1] libssh2 security update CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3856 CONFIRM https://security.netapp.com/advisory/ntap-20190327-0005/ MISC https://www.libssh2.org/CVE-2019-3856.html SUSE openSUSE-SU-2019:1075 SUSE openSUSE-SU-2019:1109 An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.