ID:2027 - Exploit for Integer overflow in libssh2 - CVE-2019-13115

 
Main Vulnerability Database Exploits ID:2027 - Exploit for Integer overflow in libssh2 - CVE-2019-13115

ID:2027 - Exploit for Integer overflow in libssh2 - CVE-2019-13115

Published: March 18, 2020


Vulnerability identifier: #VU19258
Vulnerability risk: Medium
CVE-ID: CVE-2019-13115
CWE-ID: CWE-190
Exploitation vector: Remote access
Vulnerable software:
libssh2

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on a targeted system.

The vulnerability exists due to integer overflow in the "kex_method_diffie_hellman_group_exchange_sha256_key_exchange" function in the "kex.c" file. A remote attacker can trick a victim to connect to an attacker-controlled Secure Shell (SSH) server, which would allow the attacker to send packets that submit malicious input to the targeted system, trigger integer overflow leading to an out-of-bounds write condition and execute arbitrary code or cause a DoS condition.



Remediation

Install updates from vendor's website.