An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
History

Wed, 23 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2019-03-25T18:30:56.000Z

Updated: 2025-04-23T19:48:11.114Z

Reserved: 2019-01-03T00:00:00.000Z

Link: CVE-2019-3857

cve-icon Vulnrichment

Updated: 2024-08-04T19:19:18.668Z

cve-icon NVD

Status : Modified

Published: 2019-03-25T19:29:01.837

Modified: 2024-11-21T04:42:43.817

Link: CVE-2019-3857

cve-icon Redhat

Severity : Important

Publid Date: 2019-03-13T00:00:00Z

Links: CVE-2019-3857 - Bugzilla