{"id":"CVE-2019-3857","details":"An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.","modified":"2026-04-16T04:32:00.256446539Z","published":"2019-03-25T19:29:01.837Z","related":["SUSE-SU-2019:0655-1","SUSE-SU-2019:13982-1","SUSE-SU-2019:13997-1","SUSE-SU-2020:3551-1","openSUSE-SU-2019:1109-1","openSUSE-SU-2020:2126-1","openSUSE-SU-2020:2129-1","openSUSE-SU-2024:10999-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1791"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2399"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1943"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Apr/25"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4431"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190327-0005/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0679"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1175"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1652"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3857"},{"type":"FIX","url":"https://www.libssh2.org/CVE-2019-3857.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libssh2/libssh2","events":[{"introduced":"5633bb4a3b0dfe80a82c95919e0d5afa3e88779a"},{"last_affected":"30e9c1347e3b8baa2951db612f05e6d87fc8e2f2"}],"database_specific":{"versions":[{"introduced":"1.2.8"},{"last_affected":"1.8.0"}]}}],"versions":["libssh2-1.2.8","libssh2-1.2.9","libssh2-1.3.0","libssh2-1.4.0","libssh2-1.4.1","libssh2-1.4.2","libssh2-1.4.3","libssh2-1.5.0","libssh2-1.6.0","libssh2-1.7.0","libssh2-1.8.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3857.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"28"}]},{"events":[{"introduced":"0"},{"last_affected":"8.56"}]},{"events":[{"introduced":"0"},{"last_affected":"8.57"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}