cpe:/a:libssh2:libssh2:0.1 cpe:/a:libssh2:libssh2:0.3 cpe:/a:libssh2:libssh2:0.5 cpe:/a:libssh2:libssh2:0.6 cpe:/a:libssh2:libssh2:0.7 cpe:/a:libssh2:libssh2:0.8 cpe:/a:libssh2:libssh2:0.10 cpe:/a:libssh2:libssh2:0.11 cpe:/a:libssh2:libssh2:0.12 cpe:/a:libssh2:libssh2:0.13 cpe:/a:libssh2:libssh2:0.14 cpe:/a:libssh2:libssh2:0.15 cpe:/a:libssh2:libssh2:0.16 cpe:/a:libssh2:libssh2:0.17 cpe:/a:libssh2:libssh2:0.18 cpe:/a:libssh2:libssh2:1.0 cpe:/a:libssh2:libssh2:1.1 cpe:/a:libssh2:libssh2:1.2 cpe:/a:libssh2:libssh2:1.2.1 cpe:/a:libssh2:libssh2:1.2.2 cpe:/a:libssh2:libssh2:1.2.3 cpe:/a:libssh2:libssh2:1.2.4 cpe:/a:libssh2:libssh2:1.2.5 cpe:/a:libssh2:libssh2:1.2.6 cpe:/a:libssh2:libssh2:1.2.7 cpe:/a:libssh2:libssh2:1.2.8 cpe:/a:libssh2:libssh2:1.2.9 cpe:/a:libssh2:libssh2:1.3.0 cpe:/a:libssh2:libssh2:1.4.0 cpe:/a:libssh2:libssh2:1.4.1 cpe:/a:libssh2:libssh2:1.4.2 cpe:/a:libssh2:libssh2:1.4.3 cpe:/a:libssh2:libssh2:1.5.0 cpe:/a:libssh2:libssh2:1.6.0 cpe:/a:libssh2:libssh2:1.7.0 cpe:/a:libssh2:libssh2:1.8.0 cpe:/a:netapp:ontap_select_deploy_administration_utility:- cpe:/o:debian:debian_linux:8.0 cpe:/o:opensuse:leap:15.0 cpe:/o:opensuse:leap:42.3 cpe:/o:redhat:enterprise_linux_desktop:7.0 cpe:/o:redhat:enterprise_linux_server:7.0 cpe:/o:redhat:enterprise_linux_server_aus:7.6 cpe:/o:redhat:enterprise_linux_server_eus:7.6 cpe:/o:redhat:enterprise_linux_server_tus:7.6 cpe:/o:redhat:enterprise_linux_workstation:7.0 CVE-2019-3863 2019-03-25T14:29:01.590-04:00 2019-05-14T17:29:04.153-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov BUGTRAQ 20190415 [SECURITY] [DSA 4431-1] libssh2 security update DEBIAN DSA-4431 FEDORA FEDORA-2019-3348cb4934 REDHAT RHSA-2019:0679 REDHAT RHSA-2019:1175 REDHAT RHSA-2019:1652 REDHAT RHSA-2019:1791 REDHAT RHSA-2019:1943 REDHAT RHSA-2019:2399 MLIST [debian-lts-announce] 20190326 [SECURITY] [DLA 1730-1] libssh2 security update CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3863 CONFIRM https://security.netapp.com/advisory/ntap-20190327-0005/ MISC https://www.libssh2.org/CVE-2019-3863.html SUSE openSUSE-SU-2019:1075 SUSE openSUSE-SU-2019:1109 A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.