CVE-2019-3862 (NVD)

2019-03-21

An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.

Products Debian_linux, Fedora, Libssh2, Ontap_select_deploy_administration_utility, Leap
Type Out-of-bounds Read (CWE-125)
First patch - None (likely due to unavailable code)
Links https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
http://www.openwall.com/lists/oss-security/2019/03/18/3
https://security.netapp.com/advisory/ntap-20190327-0005/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://www.debian.org/security/2019/dsa-4431