CVE-2019-3855

CVE Details

Release Date:2019-03-21

Description


An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.

See more information about CVE-2019-3855 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 8.8 Base Metrics: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Access Vector: Network Attack Complexity: Low
Privileges Required: None User Interaction: Required
Scope: Unchanged Confidentiality Impact: High
Integrity Impact: High Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (libssh2)ELSA-2019-16522019-07-02
Oracle Linux version 7 (libssh2)ELSA-2019-06792019-03-28
Oracle Linux version 8 (hivex)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libguestfs)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libguestfs-winsupport)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libiscsi)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libssh2)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libvirt)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libvirt-dbus)ELSA-2019-11752019-07-30
Oracle Linux version 8 (libvirt-python)ELSA-2019-11752019-07-30
Oracle Linux version 8 (nbdkit)ELSA-2019-11752019-07-30
Oracle Linux version 8 (netcf)ELSA-2019-11752019-07-30
Oracle Linux version 8 (perl-Sys-Virt)ELSA-2019-11752019-07-30
Oracle Linux version 8 (qemu-kvm)ELSA-2019-11752019-07-30
Oracle Linux version 8 (seabios)ELSA-2019-11752019-07-30
Oracle Linux version 8 (sgabios)ELSA-2019-11752019-07-30
Oracle Linux version 8 (supermin)ELSA-2019-11752019-07-30
Oracle VM version 3.3 (libssh2)OVMSA-2019-00322019-07-03
Oracle VM version 3.4 (libssh2)OVMSA-2019-00322019-07-03



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete