In libssh2 before 1.9.0,...
High severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jun 21, 2023
Description
Published by the National Vulnerability Database
Jul 16, 2019
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Jun 21, 2023
In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds write in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
References