摘要:
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
安全等级: Low
公告ID: KylinSec-SA-2020-1068
发布日期: 2022年10月24日
关联CVE: CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2019-17498 | KY3.4-4A | libssh2 | Unaffected |
CVE-2019-17498 | KY3.4-5A | libssh2 | Unaffected |
CVE-2019-17498 | KY3.5.1 | libssh2 | Unaffected |