In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
References
Information
Published : 2019-10-21 22:15
Updated : 2021-12-18 02:15
NVD link : CVE-2019-17498
Mitre link : CVE-2019-17498
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
libssh2
- libssh2
opensuse
- leap
CWE
CWE-190
Integer Overflow or Wraparound
