Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2019-3855

PUBLISHED 04.08.2024

CNA: redhat

Обновлено: 16.10.2019
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

CWE

Идентификатор Описание
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.

БДУ ФСТЭК

Идентификатор Описание
BDU:2019-03331 Уязвимость функции _libssh2_transport_read (src/transport.c) библиотеки libssh2, позволяющая нарушителю выполнить произвольный код
BDU:2019-03898 Уязвимость библиотеки libssh2, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVSS

Оценка Severity Версия Базовый вектор
7.5 HIGH 3.0 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Доп. Информация

Product Status

libssh2
Product: libssh2
Vendor: The libssh2 Project
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии 1.8.1 affected
 

Ссылки

http://www.openwall.com/lists/oss-security/2019/03/18/3
https://seclists.org/bugtraq/2019/Mar/25
https://www.libssh2.org/CVE-2019-3855.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
http://www.securityfocus.com/bid/107485
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFW...
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://security.netapp.com/advisory/ntap-20190327-0005/
https://access.redhat.com/errata/RHSA-2019:0679
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEK...
https://www.debian.org/security/2019/dsa-4431
https://seclists.org/bugtraq/2019/Apr/25
https://access.redhat.com/errata/RHSA-2019:1175
https://access.redhat.com/errata/RHSA-2019:1652
https://access.redhat.com/errata/RHSA-2019:1791
https://access.redhat.com/errata/RHSA-2019:1943
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KD...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIR...
https://access.redhat.com/errata/RHSA-2019:2399
https://support.apple.com/kb/HT210609
https://seclists.org/bugtraq/2019/Sep/49
http://seclists.org/fulldisclosure/2019/Sep/42
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

CVE Program Container

Обновлено: 04.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

http://www.openwall.com/lists/oss-security/2019/03/18/3
https://seclists.org/bugtraq/2019/Mar/25
https://www.libssh2.org/CVE-2019-3855.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
http://www.securityfocus.com/bid/107485
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFW...
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://security.netapp.com/advisory/ntap-20190327-0005/
https://access.redhat.com/errata/RHSA-2019:0679
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEK...
https://www.debian.org/security/2019/dsa-4431
https://seclists.org/bugtraq/2019/Apr/25
https://access.redhat.com/errata/RHSA-2019:1175
https://access.redhat.com/errata/RHSA-2019:1652
https://access.redhat.com/errata/RHSA-2019:1791
https://access.redhat.com/errata/RHSA-2019:1943
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KD...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIR...
https://access.redhat.com/errata/RHSA-2019:2399
https://support.apple.com/kb/HT210609
https://seclists.org/bugtraq/2019/Sep/49
http://seclists.org/fulldisclosure/2019/Sep/42
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.