Multiple integer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified vulnerabilities.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libssh | Libssh | * | 0.5.2 (including) |
Libssh | Libssh | 0.4.7 (including) | 0.4.7 (including) |
Libssh | Libssh | 0.4.8 (including) | 0.4.8 (including) |
Libssh | Libssh | 0.5.0 (including) | 0.5.0 (including) |
Libssh | Libssh | 0.5.0-rc1 (including) | 0.5.0-rc1 (including) |
Libssh | Libssh | 0.5.1 (including) | 0.5.1 (including) |
Libssh | Ubuntu | hardy | * |
Libssh | Ubuntu | lucid | * |
Libssh | Ubuntu | oneiric | * |
Libssh | Ubuntu | precise | * |
Libssh | Ubuntu | quantal | * |
Libssh | Ubuntu | upstream | * |