#VU18024 Integer overflow in libssh2 - CVE-2019-3855

 

#VU18024 Integer overflow in libssh2 - CVE-2019-3855

Published: March 19, 2019


Vulnerability identifier: #VU18024
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-3855
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
libssh2
Software vendor:
libssh2.org

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the _libssh2_transport_read() function in transport.cwhen processing packet_lengthvalues. A remote attacker can trick the victim to connect to a malicious SSH server, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links