Source: libssh2
Version: 1.8.0-2.1
Severity: important
Tags: security upstream

Hi,

The following vulnerability was published for libssh2.

CVE-2019-17498[0]:
| In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic
| in packet.c has an integer overflow in a bounds check, enabling an
| attacker to specify an arbitrary (out-of-bounds) offset for a
| subsequent memory read. A crafted SSH server may be able to disclose
| sensitive information or cause a denial of service condition on the
| client system when a user connects to the server.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-17498
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
[1] https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
[2] 
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
[3] 
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
[4] 
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
 

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to