CVE Vulnerabilities

CVE-2019-3862

Improper Handling of Length Parameter Inconsistency

Published: Mar 21, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
7.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

NameVendorStart VersionEnd Version
Libssh2Libssh2*1.8.1 (excluding)
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-34/ansible-tower-memcached:1.4.15-28*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-35/ansible-tower-memcached:1.4.15-28*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-37/ansible-tower-memcached-rhel7:1.4.15-28*
Red Hat Enterprise Linux 7RedHatlibssh2-0:1.4.3-12.el7_6.3*
Libssh2Ubuntubionic*
Libssh2Ubuntucosmic*
Libssh2Ubuntuesm-apps/bionic*
Libssh2Ubuntuesm-apps/xenial*
Libssh2Ubuntuesm-infra-legacy/trusty*
Libssh2Ubuntutrusty*
Libssh2Ubuntutrusty/esm*
Libssh2Ubuntuupstream*
Libssh2Ubuntuxenial*

Potential Mitigations

References