{"id":"CVE-2019-3861","details":"An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.","modified":"2026-04-16T04:37:13.317077552Z","published":"2019-03-25T19:29:01.930Z","related":["SUSE-SU-2019:0655-1","SUSE-SU-2019:13982-1","SUSE-SU-2019:13997-1","SUSE-SU-2020:3551-1","openSUSE-SU-2019:1109-1","openSUSE-SU-2020:2126-1","openSUSE-SU-2020:2129-1","openSUSE-SU-2024:10999-1"],"references":[{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Apr/25"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190327-0005/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4431"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2136"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3861"},{"type":"FIX","url":"https://www.libssh2.org/CVE-2019-3861.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libssh2/libssh2","events":[{"introduced":"74b12c3c7adaab4ab22f0284672dd95a573664b6"},{"last_affected":"30e9c1347e3b8baa2951db612f05e6d87fc8e2f2"}],"database_specific":{"versions":[{"introduced":"0.15"},{"last_affected":"1.8.0"}]}}],"versions":["RELEASE.0.15","RELEASE.0.16","RELEASE.0.17","RELEASE.0.18","RELEASE.1.0","RELEASE.1.1","libssh2-1.2","libssh2-1.2.1","libssh2-1.2.3","libssh2-1.2.4","libssh2-1.2.5","libssh2-1.2.6","libssh2-1.2.7","libssh2-1.2.8","libssh2-1.2.9","libssh2-1.3.0","libssh2-1.4.0","libssh2-1.4.1","libssh2-1.4.2","libssh2-1.4.3","libssh2-1.5.0","libssh2-1.6.0","libssh2-1.7.0","libssh2-1.8.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3861.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}