An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
21/03/2019
by Libssh2
4 months ago
by Netapp
8 months ago
by Fedoraproject
a month ago
by Debian
2 months ago
by Opensuse
7 months ago